Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-49390 (GCVE-0-2022-49390)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
Linux | Linux |
Version: 2bce1ebed17da54c65042ec2b962e3234bad5b47 Version: 2bce1ebed17da54c65042ec2b962e3234bad5b47 Version: 2bce1ebed17da54c65042ec2b962e3234bad5b47 Version: 1861904a6092ed411203c6a02c75bfc45b27cc3c Version: 3a2675a2d97a68332fa5c33043038bfeb31455a8 Version: b0add6db3d5ec4561cab257358871a9d3df7f0a3 |
||
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-49390", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-27T17:58:33.560218Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-27T18:02:28.747Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/net/macsec.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "78933cbc143b82d02330e00900d2fd08f2682f4e", "status": "affected", "version": "2bce1ebed17da54c65042ec2b962e3234bad5b47", "versionType": "git" }, { "lessThan": "d130282179aa6051449ac8f8df1115769998a665", "status": "affected", "version": "2bce1ebed17da54c65042ec2b962e3234bad5b47", "versionType": "git" }, { "lessThan": "196a888ca6571deb344468e1d7138e3273206335", "status": "affected", "version": "2bce1ebed17da54c65042ec2b962e3234bad5b47", "versionType": "git" }, { "status": "affected", "version": "1861904a6092ed411203c6a02c75bfc45b27cc3c", "versionType": "git" }, { "status": "affected", "version": "3a2675a2d97a68332fa5c33043038bfeb31455a8", "versionType": "git" }, { "status": "affected", "version": "b0add6db3d5ec4561cab257358871a9d3df7f0a3", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/net/macsec.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "5.4" }, { "lessThan": "5.4", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "5.17.*", "status": "unaffected", "version": "5.17.15", "versionType": "semver" }, { "lessThanOrEqual": "5.18.*", "status": "unaffected", "version": "5.18.3", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "5.19", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.17.15", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.18.3", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "5.19", "versionStartIncluding": "5.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.14.154", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.19.84", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.3.11", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacsec: fix UAF bug for real_dev\n\nCreate a new macsec device but not get reference to real_dev. That can\nnot ensure that real_dev is freed after macsec. That will trigger the\nUAF bug for real_dev as following:\n\n==================================================================\nBUG: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\nCall Trace:\n ...\n macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\n dev_get_iflink+0x73/0xe0 net/core/dev.c:637\n default_operstate net/core/link_watch.c:42 [inline]\n rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54\n linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161\n\nAllocated by task 22209:\n ...\n alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549\n rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235\n veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748\n\nFreed by task 8:\n ...\n kfree+0xd6/0x4d0 mm/slub.c:4552\n kvfree+0x42/0x50 mm/util.c:615\n device_release+0x9f/0x240 drivers/base/core.c:2229\n kobject_cleanup lib/kobject.c:673 [inline]\n kobject_release lib/kobject.c:704 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0x1c8/0x540 lib/kobject.c:721\n netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327\n\nAfter commit faab39f63c1f (\"net: allow out-of-order netdev unregistration\")\nand commit e5f80fcf869a (\"ipv6: give an IPv6 dev to blackhole_netdev\"), we\ncan add dev_hold_track() in macsec_dev_init() and dev_put_track() in\nmacsec_free_netdev() to fix the problem." } ], "providerMetadata": { "dateUpdated": "2025-05-04T12:44:34.195Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e" }, { "url": "https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665" }, { "url": "https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335" } ], "title": "macsec: fix UAF bug for real_dev", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2022-49390", "datePublished": "2025-02-26T02:11:23.327Z", "dateReserved": "2025-02-26T02:08:31.561Z", "dateUpdated": "2025-05-04T12:44:34.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-49390\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-26T07:01:15.620\",\"lastModified\":\"2025-03-25T13:48:09.850\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmacsec: fix UAF bug for real_dev\\n\\nCreate a new macsec device but not get reference to real_dev. That can\\nnot ensure that real_dev is freed after macsec. That will trigger the\\nUAF bug for real_dev as following:\\n\\n==================================================================\\nBUG: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\\nCall Trace:\\n ...\\n macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\\n dev_get_iflink+0x73/0xe0 net/core/dev.c:637\\n default_operstate net/core/link_watch.c:42 [inline]\\n rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54\\n linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161\\n\\nAllocated by task 22209:\\n ...\\n alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549\\n rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235\\n veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748\\n\\nFreed by task 8:\\n ...\\n kfree+0xd6/0x4d0 mm/slub.c:4552\\n kvfree+0x42/0x50 mm/util.c:615\\n device_release+0x9f/0x240 drivers/base/core.c:2229\\n kobject_cleanup lib/kobject.c:673 [inline]\\n kobject_release lib/kobject.c:704 [inline]\\n kref_put include/linux/kref.h:65 [inline]\\n kobject_put+0x1c8/0x540 lib/kobject.c:721\\n netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327\\n\\nAfter commit faab39f63c1f (\\\"net: allow out-of-order netdev unregistration\\\")\\nand commit e5f80fcf869a (\\\"ipv6: give an IPv6 dev to blackhole_netdev\\\"), we\\ncan add dev_hold_track() in macsec_dev_init() and dev_put_track() in\\nmacsec_free_netdev() to fix the problem.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: macsec: se corrige el error UAF para real_dev Crea un nuevo dispositivo macsec pero no obtiene la referencia a real_dev. Esto no puede garantizar que real_dev se libere despu\u00e9s de macsec. Esto activar\u00e1 el error UAF para real_dev de la siguiente manera: ==================================================================== ERROR: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662 Call Trace: ... macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662 dev_get_iflink+0x73/0xe0 net/core/dev.c:637 default_operstate net/core/link_watch.c:42 [inline] rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54 linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161 Allocated by task 22209: ... alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549 rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235 veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748 Freed by task 8: ... kfree+0xd6/0x4d0 mm/slub.c:4552 kvfree+0x42/0x50 mm/util.c:615 device_release+0x9f/0x240 drivers/base/core.c:2229 kobject_cleanup lib/kobject.c:673 [inline] kobject_release lib/kobject.c:704 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1c8/0x540 lib/kobject.c:721 netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327 After commit faab39f63c1f (\\\"net: allow out-of-order netdev unregistration\\\") and commit e5f80fcf869a (\\\"ipv6: give an IPv6 dev to blackhole_netdev\\\"), we can add dev_hold_track() in macsec_dev_init() and dev_put_track() in macsec_free_netdev() to fix the problem. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.154\",\"versionEndExcluding\":\"4.15\",\"matchCriteriaId\":\"344FEFB4-E393-4E04-905A-4734AC267EC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.19.84\",\"versionEndExcluding\":\"4.20\",\"matchCriteriaId\":\"B7EACEB9-7173-47F4-83A4-AE06CE74D78B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.3.11\",\"versionEndExcluding\":\"5.17.15\",\"matchCriteriaId\":\"ADA13345-8170-4521-B0CB-44DDF2C0713F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.18\",\"versionEndExcluding\":\"5.18.3\",\"matchCriteriaId\":\"8E122216-2E9E-4B3E-B7B8-D575A45BA3C2\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-49390\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-27T17:58:33.560218Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-27T17:58:35.320Z\"}}], \"cna\": {\"title\": \"macsec: fix UAF bug for real_dev\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"2bce1ebed17da54c65042ec2b962e3234bad5b47\", \"lessThan\": \"78933cbc143b82d02330e00900d2fd08f2682f4e\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2bce1ebed17da54c65042ec2b962e3234bad5b47\", \"lessThan\": \"d130282179aa6051449ac8f8df1115769998a665\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2bce1ebed17da54c65042ec2b962e3234bad5b47\", \"lessThan\": \"196a888ca6571deb344468e1d7138e3273206335\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"1861904a6092ed411203c6a02c75bfc45b27cc3c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"3a2675a2d97a68332fa5c33043038bfeb31455a8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"b0add6db3d5ec4561cab257358871a9d3df7f0a3\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/net/macsec.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.4\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.4\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.17.15\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.17.*\"}, {\"status\": \"unaffected\", \"version\": \"5.18.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"5.18.*\"}, {\"status\": \"unaffected\", \"version\": \"5.19\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/net/macsec.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e\"}, {\"url\": \"https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665\"}, {\"url\": \"https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmacsec: fix UAF bug for real_dev\\n\\nCreate a new macsec device but not get reference to real_dev. That can\\nnot ensure that real_dev is freed after macsec. That will trigger the\\nUAF bug for real_dev as following:\\n\\n==================================================================\\nBUG: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\\nCall Trace:\\n ...\\n macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\\n dev_get_iflink+0x73/0xe0 net/core/dev.c:637\\n default_operstate net/core/link_watch.c:42 [inline]\\n rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54\\n linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161\\n\\nAllocated by task 22209:\\n ...\\n alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549\\n rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235\\n veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748\\n\\nFreed by task 8:\\n ...\\n kfree+0xd6/0x4d0 mm/slub.c:4552\\n kvfree+0x42/0x50 mm/util.c:615\\n device_release+0x9f/0x240 drivers/base/core.c:2229\\n kobject_cleanup lib/kobject.c:673 [inline]\\n kobject_release lib/kobject.c:704 [inline]\\n kref_put include/linux/kref.h:65 [inline]\\n kobject_put+0x1c8/0x540 lib/kobject.c:721\\n netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327\\n\\nAfter commit faab39f63c1f (\\\"net: allow out-of-order netdev unregistration\\\")\\nand commit e5f80fcf869a (\\\"ipv6: give an IPv6 dev to blackhole_netdev\\\"), we\\ncan add dev_hold_track() in macsec_dev_init() and dev_put_track() in\\nmacsec_free_netdev() to fix the problem.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.17.15\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.18.3\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"5.19\", \"versionStartIncluding\": \"5.4\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.14.154\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"4.19.84\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionStartIncluding\": \"5.3.11\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T12:44:34.195Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-49390\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T12:44:34.195Z\", \"dateReserved\": \"2025-02-26T02:08:31.561Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2025-02-26T02:11:23.327Z\", \"assignerShortName\": \"Linux\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
CERTFR-2025-AVI-0307
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | N/A | SUSE Manager Proxy 4.3 | ||
SUSE | N/A | Basesystem Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | N/A | SUSE Real Time Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
SUSE | N/A | Public Cloud Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
SUSE | N/A | openSUSE Leap 15.4 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | N/A | openSUSE Leap 15.5 | ||
SUSE | N/A | SUSE Manager Server 4.3 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | N/A | Legacy Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | N/A | openSUSE Leap 15.6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | N/A | Development Tools Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise Micro for Rancher 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Real Time Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Public Cloud Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "name": "CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "name": "CVE-2022-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1016" }, { "name": "CVE-2022-1184", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1184" }, { "name": "CVE-2022-1048", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1048" }, { "name": "CVE-2022-0168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0168" }, { "name": "CVE-2022-3435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435" }, { "name": "CVE-2022-29901", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29901" }, { "name": "CVE-2022-29900", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29900" }, { "name": "CVE-2022-2977", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2977" }, { "name": "CVE-2022-3303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3303" }, { "name": "CVE-2023-0179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0179" }, { "name": "CVE-2023-1652", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1652" }, { "name": "CVE-2023-28410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28410" }, { "name": "CVE-2023-2162", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2162" }, { "name": "CVE-2023-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3567" }, { "name": "CVE-2024-2201", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2201" }, { "name": "CVE-2024-26634", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26634" }, { "name": "CVE-2021-47248", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47248" }, { "name": "CVE-2024-35910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910" }, { "name": "CVE-2024-26873", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26873" }, { "name": "CVE-2024-35826", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35826" }, { "name": "CVE-2024-41005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005" }, { "name": "CVE-2024-38606", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38606" }, { "name": "CVE-2024-41077", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41077" }, { "name": "CVE-2024-42229", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42229" }, { "name": "CVE-2024-41092", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41092" }, { "name": "CVE-2024-42098", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42098" }, { "name": "CVE-2024-42240", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42240" }, { "name": "CVE-2021-47517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47517" }, { "name": "CVE-2024-46782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46782" }, { "name": "CVE-2024-50126", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50126" }, { "name": "CVE-2024-50290", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290" }, { "name": "CVE-2024-53057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53057" }, { "name": "CVE-2024-53063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063" }, { "name": "CVE-2024-42307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307" }, { "name": "CVE-2024-43820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43820" }, { "name": "CVE-2024-49924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49924" }, { "name": "CVE-2024-47678", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47678" }, { "name": "CVE-2024-53140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140" }, { "name": "CVE-2024-53064", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53064" }, { "name": "CVE-2024-56642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642" }, { "name": "CVE-2024-56651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56651" }, { "name": "CVE-2024-49994", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994" }, { "name": "CVE-2024-53124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124" }, { "name": "CVE-2024-56703", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56703" }, { "name": "CVE-2025-21631", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21631" }, { "name": "CVE-2025-21671", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21671" }, { "name": "CVE-2024-49940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49940" }, { "name": "CVE-2024-50056", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50056" }, { "name": "CVE-2024-50140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50140" }, { "name": "CVE-2024-50152", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50152" }, { "name": "CVE-2024-53163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53163" }, { "name": "CVE-2024-53176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53176" }, { "name": "CVE-2024-53178", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53178" }, { "name": "CVE-2024-56702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702" }, { "name": "CVE-2024-56751", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56751" }, { "name": "CVE-2023-52926", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52926" }, { "name": "CVE-2024-47408", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47408" }, { "name": "CVE-2024-49571", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571" }, { "name": "CVE-2024-53680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680" }, { "name": "CVE-2024-56640", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640" }, { "name": "CVE-2024-56718", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56718" }, { "name": "CVE-2024-56770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770" }, { "name": "CVE-2024-57807", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57807" }, { "name": "CVE-2024-57900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900" }, { "name": "CVE-2021-47633", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47633" }, { "name": "CVE-2021-47644", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47644" }, { "name": "CVE-2022-49076", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49076" }, { "name": "CVE-2022-49089", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49089" }, { "name": "CVE-2022-49134", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49134" }, { "name": "CVE-2022-49135", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49135" }, { "name": "CVE-2022-49151", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49151" }, { "name": "CVE-2022-49178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49178" }, { "name": "CVE-2022-49182", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49182" }, { "name": "CVE-2022-49201", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49201" }, { "name": "CVE-2022-49247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49247" }, { "name": "CVE-2022-49490", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49490" }, { "name": "CVE-2022-49626", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49626" }, { "name": "CVE-2022-49661", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49661" }, { "name": "CVE-2024-57979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979" }, { "name": "CVE-2025-21733", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21733" }, { "name": "CVE-2025-21753", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21753" }, { "name": "CVE-2025-21754", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21754" }, { "name": "CVE-2021-4453", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4453" }, { "name": "CVE-2021-47631", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47631" }, { "name": "CVE-2021-47632", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47632" }, { "name": "CVE-2021-47635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47635" }, { "name": "CVE-2021-47636", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47636" }, { "name": "CVE-2021-47637", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47637" }, { "name": "CVE-2021-47638", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47638" }, { "name": "CVE-2021-47639", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47639" }, { "name": "CVE-2021-47641", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47641" }, { "name": "CVE-2021-47642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47642" }, { "name": "CVE-2021-47643", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47643" }, { "name": "CVE-2021-47645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47645" }, { "name": "CVE-2021-47646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47646" }, { "name": "CVE-2021-47647", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47647" }, { "name": "CVE-2021-47648", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47648" }, { "name": "CVE-2021-47649", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47649" }, { "name": "CVE-2021-47650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47650" }, { "name": "CVE-2021-47651", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47651" }, { "name": "CVE-2021-47652", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47652" }, { "name": "CVE-2021-47653", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47653" }, { "name": "CVE-2021-47654", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47654" }, { "name": "CVE-2021-47656", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47656" }, { "name": "CVE-2021-47657", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47657" }, { "name": "CVE-2021-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47659" }, { "name": "CVE-2022-0995", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0995" }, { "name": "CVE-2022-49044", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49044" }, { "name": "CVE-2022-49050", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49050" }, { "name": "CVE-2022-49051", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49051" }, { "name": "CVE-2022-49054", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49054" }, { "name": "CVE-2022-49055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49055" }, { "name": "CVE-2022-49058", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49058" }, { "name": "CVE-2022-49059", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49059" }, { "name": "CVE-2022-49060", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49060" }, { "name": "CVE-2022-49061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49061" }, { "name": "CVE-2022-49063", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063" }, { "name": "CVE-2022-49065", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49065" }, { "name": "CVE-2022-49066", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49066" }, { "name": "CVE-2022-49073", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49073" }, { "name": "CVE-2022-49074", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49074" }, { "name": "CVE-2022-49078", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49078" }, { "name": "CVE-2022-49082", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49082" }, { "name": "CVE-2022-49083", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49083" }, { "name": "CVE-2022-49084", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49084" }, { "name": "CVE-2022-49085", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49085" }, { "name": "CVE-2022-49086", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49086" }, { "name": "CVE-2022-49088", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49088" }, { "name": "CVE-2022-49090", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49090" }, { "name": "CVE-2022-49091", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49091" }, { "name": "CVE-2022-49092", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49092" }, { "name": "CVE-2022-49093", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49093" }, { "name": "CVE-2022-49095", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49095" }, { "name": "CVE-2022-49096", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49096" }, { "name": "CVE-2022-49097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49097" }, { "name": "CVE-2022-49098", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49098" }, { "name": "CVE-2022-49099", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49099" }, { "name": "CVE-2022-49100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49100" }, { "name": "CVE-2022-49102", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49102" }, { "name": "CVE-2022-49103", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49103" }, { "name": "CVE-2022-49104", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49104" }, { "name": "CVE-2022-49105", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49105" }, { "name": "CVE-2022-49106", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49106" }, { "name": "CVE-2022-49107", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49107" }, { "name": "CVE-2022-49109", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49109" }, { "name": "CVE-2022-49111", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49111" }, { "name": "CVE-2022-49112", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49112" }, { "name": "CVE-2022-49113", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49113" }, { "name": "CVE-2022-49114", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49114" }, { "name": "CVE-2022-49115", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49115" }, { "name": "CVE-2022-49116", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49116" }, { "name": "CVE-2022-49118", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49118" }, { "name": "CVE-2022-49119", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49119" }, { "name": "CVE-2022-49120", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49120" }, { "name": "CVE-2022-49121", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49121" }, { "name": "CVE-2022-49122", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49122" }, { "name": "CVE-2022-49126", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49126" }, { "name": "CVE-2022-49128", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49128" }, { "name": "CVE-2022-49129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49129" }, { "name": "CVE-2022-49130", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49130" }, { "name": "CVE-2022-49131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49131" }, { "name": "CVE-2022-49132", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49132" }, { "name": "CVE-2022-49137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49137" }, { "name": "CVE-2022-49145", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49145" }, { "name": "CVE-2022-49147", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49147" }, { "name": "CVE-2022-49148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49148" }, { "name": "CVE-2022-49153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49153" }, { "name": "CVE-2022-49154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49154" }, { "name": "CVE-2022-49155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49155" }, { "name": "CVE-2022-49156", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49156" }, { "name": "CVE-2022-49157", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49157" }, { "name": "CVE-2022-49158", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49158" }, { "name": "CVE-2022-49159", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49159" }, { "name": "CVE-2022-49160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49160" }, { "name": "CVE-2022-49162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49162" }, { "name": "CVE-2022-49163", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49163" }, { "name": "CVE-2022-49164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49164" }, { "name": "CVE-2022-49165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49165" }, { "name": "CVE-2022-49174", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49174" }, { "name": "CVE-2022-49175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49175" }, { "name": "CVE-2022-49176", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49176" }, { "name": "CVE-2022-49177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49177" }, { "name": "CVE-2022-49179", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49179" }, { "name": "CVE-2022-49180", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49180" }, { "name": "CVE-2022-49185", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49185" }, { "name": "CVE-2022-49187", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49187" }, { "name": "CVE-2022-49188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49188" }, { "name": "CVE-2022-49189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49189" }, { "name": "CVE-2022-49193", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49193" }, { "name": "CVE-2022-49194", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49194" }, { "name": "CVE-2022-49196", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49196" }, { "name": "CVE-2022-49199", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49199" }, { "name": "CVE-2022-49200", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49200" }, { "name": "CVE-2022-49206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49206" }, { "name": "CVE-2022-49208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49208" }, { "name": "CVE-2022-49212", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49212" }, { "name": "CVE-2022-49213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49213" }, { "name": "CVE-2022-49214", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49214" }, { "name": "CVE-2022-49216", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49216" }, { "name": "CVE-2022-49217", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49217" }, { "name": "CVE-2022-49218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49218" }, { "name": "CVE-2022-49221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49221" }, { "name": "CVE-2022-49222", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49222" }, { "name": "CVE-2022-49224", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49224" }, { "name": "CVE-2022-49226", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49226" }, { "name": "CVE-2022-49227", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49227" }, { "name": "CVE-2022-49232", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49232" }, { "name": "CVE-2022-49235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49235" }, { "name": "CVE-2022-49236", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49236" }, { "name": "CVE-2022-49239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49239" }, { "name": "CVE-2022-49241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49241" }, { "name": "CVE-2022-49242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49242" }, { "name": "CVE-2022-49243", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49243" }, { "name": "CVE-2022-49244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49244" }, { "name": "CVE-2022-49246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49246" }, { "name": "CVE-2022-49248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49248" }, { "name": "CVE-2022-49249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49249" }, { "name": "CVE-2022-49250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49250" }, { "name": "CVE-2022-49251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49251" }, { "name": "CVE-2022-49252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49252" }, { "name": "CVE-2022-49253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49253" }, { "name": "CVE-2022-49254", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49254" }, { "name": "CVE-2022-49256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49256" }, { "name": "CVE-2022-49257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49257" }, { "name": "CVE-2022-49258", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49258" }, { "name": "CVE-2022-49259", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49259" }, { "name": "CVE-2022-49260", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49260" }, { "name": "CVE-2022-49261", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49261" }, { "name": "CVE-2022-49262", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49262" }, { "name": "CVE-2022-49263", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49263" }, { "name": "CVE-2022-49264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49264" }, { "name": "CVE-2022-49265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49265" }, { "name": "CVE-2022-49266", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49266" }, { "name": "CVE-2022-49268", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49268" }, { "name": "CVE-2022-49269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49269" }, { "name": "CVE-2022-49270", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49270" }, { "name": "CVE-2022-49271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49271" }, { "name": "CVE-2022-49272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49272" }, { "name": "CVE-2022-49273", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49273" }, { "name": "CVE-2022-49274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49274" }, { "name": "CVE-2022-49275", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49275" }, { "name": "CVE-2022-49276", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49276" }, { "name": "CVE-2022-49277", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49277" }, { "name": "CVE-2022-49278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49278" }, { "name": "CVE-2022-49279", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49279" }, { "name": "CVE-2022-49280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49280" }, { "name": "CVE-2022-49281", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49281" }, { "name": "CVE-2022-49283", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49283" }, { "name": "CVE-2022-49285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49285" }, { "name": "CVE-2022-49286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49286" }, { "name": "CVE-2022-49287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49287" }, { "name": "CVE-2022-49288", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49288" }, { "name": "CVE-2022-49290", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49290" }, { "name": "CVE-2022-49291", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49291" }, { "name": "CVE-2022-49292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49292" }, { "name": "CVE-2022-49294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49294" }, { "name": "CVE-2022-49295", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49295" }, { "name": "CVE-2022-49297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49297" }, { "name": "CVE-2022-49298", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49298" }, { "name": "CVE-2022-49299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49299" }, { "name": "CVE-2022-49300", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49300" }, { "name": "CVE-2022-49301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49301" }, { "name": "CVE-2022-49302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49302" }, { "name": "CVE-2022-49304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49304" }, { "name": "CVE-2022-49305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49305" }, { "name": "CVE-2022-49307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49307" }, { "name": "CVE-2022-49308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49308" }, { "name": "CVE-2022-49309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49309" }, { "name": "CVE-2022-49310", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49310" }, { "name": "CVE-2022-49311", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49311" }, { "name": "CVE-2022-49312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49312" }, { "name": "CVE-2022-49313", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49313" }, { "name": "CVE-2022-49314", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49314" }, { "name": "CVE-2022-49315", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49315" }, { "name": "CVE-2022-49316", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49316" }, { "name": "CVE-2022-49319", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49319" }, { "name": "CVE-2022-49320", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49320" }, { "name": "CVE-2022-49321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49321" }, { "name": "CVE-2022-49322", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49322" }, { "name": "CVE-2022-49323", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49323" }, { "name": "CVE-2022-49326", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49326" }, { "name": "CVE-2022-49327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49327" }, { "name": "CVE-2022-49328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49328" }, { "name": "CVE-2022-49331", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49331" }, { "name": "CVE-2022-49332", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49332" }, { "name": "CVE-2022-49335", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49335" }, { "name": "CVE-2022-49336", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49336" }, { "name": "CVE-2022-49337", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49337" }, { "name": "CVE-2022-49339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49339" }, { "name": "CVE-2022-49341", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49341" }, { "name": "CVE-2022-49342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49342" }, { "name": "CVE-2022-49343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49343" }, { "name": "CVE-2022-49345", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49345" }, { "name": "CVE-2022-49346", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49346" }, { "name": "CVE-2022-49347", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49347" }, { "name": "CVE-2022-49348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49348" }, { "name": "CVE-2022-49349", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49349" }, { "name": "CVE-2022-49350", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49350" }, { "name": "CVE-2022-49351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49351" }, { "name": "CVE-2022-49352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49352" }, { "name": "CVE-2022-49354", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49354" }, { "name": "CVE-2022-49356", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49356" }, { "name": "CVE-2022-49357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49357" }, { "name": "CVE-2022-49367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49367" }, { "name": "CVE-2022-49368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49368" }, { "name": "CVE-2022-49370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49370" }, { "name": "CVE-2022-49371", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49371" }, { "name": "CVE-2022-49373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49373" }, { "name": "CVE-2022-49375", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49375" }, { "name": "CVE-2022-49376", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49376" }, { "name": "CVE-2022-49377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49377" }, { "name": "CVE-2022-49378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49378" }, { "name": "CVE-2022-49379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49379" }, { "name": "CVE-2022-49381", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49381" }, { "name": "CVE-2022-49382", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49382" }, { "name": "CVE-2022-49384", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49384" }, { "name": "CVE-2022-49385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49385" }, { "name": "CVE-2022-49386", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49386" }, { "name": "CVE-2022-49389", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49389" }, { "name": "CVE-2022-49392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49392" }, { "name": "CVE-2022-49394", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49394" }, { "name": "CVE-2022-49396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49396" }, { "name": "CVE-2022-49397", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49397" }, { "name": "CVE-2022-49398", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49398" }, { "name": "CVE-2022-49399", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49399" }, { "name": "CVE-2022-49400", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49400" }, { "name": "CVE-2022-49402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49402" }, { "name": "CVE-2022-49404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49404" }, { "name": "CVE-2022-49407", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49407" }, { "name": "CVE-2022-49409", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49409" }, { "name": "CVE-2022-49410", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49410" }, { "name": "CVE-2022-49411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49411" }, { "name": "CVE-2022-49412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49412" }, { "name": "CVE-2022-49413", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49413" }, { "name": "CVE-2022-49414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49414" }, { "name": "CVE-2022-49416", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49416" }, { "name": "CVE-2022-49418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49418" }, { "name": "CVE-2022-49421", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49421" }, { "name": "CVE-2022-49422", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49422" }, { "name": "CVE-2022-49424", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49424" }, { "name": "CVE-2022-49426", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49426" }, { "name": "CVE-2022-49427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49427" }, { "name": "CVE-2022-49429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49429" }, { "name": "CVE-2022-49430", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49430" }, { "name": "CVE-2022-49431", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49431" }, { "name": "CVE-2022-49432", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49432" }, { "name": "CVE-2022-49433", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49433" }, { "name": "CVE-2022-49434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49434" }, { "name": "CVE-2022-49435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49435" }, { "name": "CVE-2022-49437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49437" }, { "name": "CVE-2022-49438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49438" }, { "name": "CVE-2022-49440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49440" }, { "name": "CVE-2022-49441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49441" }, { "name": "CVE-2022-49442", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49442" }, { "name": "CVE-2022-49443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49443" }, { "name": "CVE-2022-49444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49444" }, { "name": "CVE-2022-49445", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49445" }, { "name": "CVE-2022-49447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49447" }, { "name": "CVE-2022-49448", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49448" }, { "name": "CVE-2022-49449", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49449" }, { "name": "CVE-2022-49451", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49451" }, { "name": "CVE-2022-49453", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49453" }, { "name": "CVE-2022-49455", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49455" }, { "name": "CVE-2022-49459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49459" }, { "name": "CVE-2022-49460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49460" }, { "name": "CVE-2022-49462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49462" }, { "name": "CVE-2022-49463", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49463" }, { "name": "CVE-2022-49466", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49466" }, { "name": "CVE-2022-49467", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49467" }, { "name": "CVE-2022-49468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49468" }, { "name": "CVE-2022-49472", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49472" }, { "name": "CVE-2022-49473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49473" }, { "name": "CVE-2022-49474", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49474" }, { "name": "CVE-2022-49475", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49475" }, { "name": "CVE-2022-49477", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49477" }, { "name": "CVE-2022-49478", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49478" }, { "name": "CVE-2022-49480", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49480" }, { "name": "CVE-2022-49481", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49481" }, { "name": "CVE-2022-49482", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49482" }, { "name": "CVE-2022-49486", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49486" }, { "name": "CVE-2022-49487", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49487" }, { "name": "CVE-2022-49488", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49488" }, { "name": "CVE-2022-49489", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49489" }, { "name": "CVE-2022-49491", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49491" }, { "name": "CVE-2022-49492", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49492" }, { "name": "CVE-2022-49493", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49493" }, { "name": "CVE-2022-49494", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49494" }, { "name": "CVE-2022-49495", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49495" }, { "name": "CVE-2022-49498", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49498" }, { "name": "CVE-2022-49501", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49501" }, { "name": "CVE-2022-49502", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49502" }, { "name": "CVE-2022-49503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49503" }, { "name": "CVE-2022-49504", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49504" }, { "name": "CVE-2022-49505", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49505" }, { "name": "CVE-2022-49506", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49506" }, { "name": "CVE-2022-49507", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49507" }, { "name": "CVE-2022-49508", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49508" }, { "name": "CVE-2022-49509", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49509" }, { "name": "CVE-2022-49512", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49512" }, { "name": "CVE-2022-49514", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49514" }, { "name": "CVE-2022-49515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49515" }, { "name": "CVE-2022-49517", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49517" }, { "name": "CVE-2022-49519", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49519" }, { "name": "CVE-2022-49520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49520" }, { "name": "CVE-2022-49521", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49521" }, { "name": "CVE-2022-49522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49522" }, { "name": "CVE-2022-49523", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49523" }, { "name": "CVE-2022-49524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49524" }, { "name": "CVE-2022-49525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49525" }, { "name": "CVE-2022-49526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49526" }, { "name": "CVE-2022-49527", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49527" }, { "name": "CVE-2022-49532", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49532" }, { "name": "CVE-2022-49534", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49534" }, { "name": "CVE-2022-49535", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535" }, { "name": "CVE-2022-49536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49536" }, { "name": "CVE-2022-49537", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49537" }, { "name": "CVE-2022-49541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49541" }, { "name": "CVE-2022-49542", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49542" }, { "name": "CVE-2022-49544", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49544" }, { "name": "CVE-2022-49545", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49545" }, { "name": "CVE-2022-49546", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49546" }, { "name": "CVE-2022-49549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49549" }, { "name": "CVE-2022-49551", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49551" }, { "name": "CVE-2022-49555", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49555" }, { "name": "CVE-2022-49556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49556" }, { "name": "CVE-2022-49559", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49559" }, { "name": "CVE-2022-49562", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49562" }, { "name": "CVE-2022-49563", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563" }, { "name": "CVE-2022-49564", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564" }, { "name": "CVE-2022-49566", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49566" }, { "name": "CVE-2022-49568", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49568" }, { "name": "CVE-2022-49569", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49569" }, { "name": "CVE-2022-49570", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49570" }, { "name": "CVE-2022-49579", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49579" }, { "name": "CVE-2022-49581", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49581" }, { "name": "CVE-2022-49583", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49583" }, { "name": "CVE-2022-49584", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49584" }, { "name": "CVE-2022-49591", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49591" }, { "name": "CVE-2022-49592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49592" }, { "name": "CVE-2022-49603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49603" }, { "name": "CVE-2022-49605", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49605" }, { "name": "CVE-2022-49606", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49606" }, { "name": "CVE-2022-49607", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49607" }, { "name": "CVE-2022-49609", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49609" }, { "name": "CVE-2022-49610", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49610" }, { "name": "CVE-2022-49611", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49611" }, { "name": "CVE-2022-49613", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49613" }, { "name": "CVE-2022-49615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49615" }, { "name": "CVE-2022-49616", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49616" }, { "name": "CVE-2022-49617", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49617" }, { "name": "CVE-2022-49618", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49618" }, { "name": "CVE-2022-49621", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49621" }, { "name": "CVE-2022-49623", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49623" }, { "name": "CVE-2022-49625", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49625" }, { "name": "CVE-2022-49627", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49627" }, { "name": "CVE-2022-49628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49628" }, { "name": "CVE-2022-49631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49631" }, { "name": "CVE-2022-49634", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49634" }, { "name": "CVE-2022-49640", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49640" }, { "name": "CVE-2022-49641", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49641" }, { "name": "CVE-2022-49642", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49642" }, { "name": "CVE-2022-49643", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49643" }, { "name": "CVE-2022-49644", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49644" }, { "name": "CVE-2022-49645", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49645" }, { "name": "CVE-2022-49646", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49646" }, { "name": "CVE-2022-49647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49647" }, { "name": "CVE-2022-49648", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49648" }, { "name": "CVE-2022-49649", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49649" }, { "name": "CVE-2022-49652", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49652" }, { "name": "CVE-2022-49653", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49653" }, { "name": "CVE-2022-49656", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49656" }, { "name": "CVE-2022-49657", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49657" }, { "name": "CVE-2022-49663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49663" }, { "name": "CVE-2022-49665", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49665" }, { "name": "CVE-2022-49667", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49667" }, { "name": "CVE-2022-49668", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49668" }, { "name": "CVE-2022-49670", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49670" }, { "name": "CVE-2022-49671", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49671" }, { "name": "CVE-2022-49672", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49672" }, { "name": "CVE-2022-49673", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49673" }, { "name": "CVE-2022-49674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49674" }, { "name": "CVE-2022-49675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49675" }, { "name": "CVE-2022-49676", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49676" }, { "name": "CVE-2022-49677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49677" }, { "name": "CVE-2022-49678", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49678" }, { "name": "CVE-2022-49679", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49679" }, { "name": "CVE-2022-49680", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49680" }, { "name": "CVE-2022-49683", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49683" }, { "name": "CVE-2022-49685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49685" }, { "name": "CVE-2022-49687", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49687" }, { "name": "CVE-2022-49688", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49688" }, { "name": "CVE-2022-49693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49693" }, { "name": "CVE-2022-49695", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49695" }, { "name": "CVE-2022-49699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49699" }, { "name": "CVE-2022-49700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49700" }, { "name": "CVE-2022-49701", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49701" }, { "name": "CVE-2022-49703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49703" }, { "name": "CVE-2022-49704", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49704" }, { "name": "CVE-2022-49705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49705" }, { "name": "CVE-2022-49707", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49707" }, { "name": "CVE-2022-49708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49708" }, { "name": "CVE-2022-49710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49710" }, { "name": "CVE-2022-49711", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49711" }, { "name": "CVE-2022-49712", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49712" }, { "name": "CVE-2022-49713", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49713" }, { "name": "CVE-2022-49714", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49714" }, { "name": "CVE-2022-49715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49715" }, { "name": "CVE-2022-49716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49716" }, { "name": "CVE-2022-49719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49719" }, { "name": "CVE-2022-49720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49720" }, { "name": "CVE-2022-49721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49721" }, { "name": "CVE-2022-49722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49722" }, { "name": "CVE-2022-49723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49723" }, { "name": "CVE-2022-49724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49724" }, { "name": "CVE-2022-49725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49725" }, { "name": "CVE-2022-49726", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49726" }, { "name": "CVE-2022-49729", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49729" }, { "name": "CVE-2022-49730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49730" }, { "name": "CVE-2022-49731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49731" }, { "name": "CVE-2022-49733", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49733" }, { "name": "CVE-2024-57996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996" }, { "name": "CVE-2024-58014", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014" }, { "name": "CVE-2025-21718", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718" }, { "name": "CVE-2025-21772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772" }, { "name": "CVE-2025-21780", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780" }, { "name": "CVE-2025-21785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785" }, { "name": "CVE-2024-47794", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47794" }, { "name": "CVE-2024-54683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683" }, { "name": "CVE-2024-56638", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56638" }, { "name": "CVE-2024-56719", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56719" }, { "name": "CVE-2024-56758", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56758" }, { "name": "CVE-2025-21635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635" }, { "name": "CVE-2025-21659", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21659" }, { "name": "CVE-2024-57834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57834" }, { "name": "CVE-2024-57973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973" }, { "name": "CVE-2024-57978", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57978" }, { "name": "CVE-2024-57980", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980" }, { "name": "CVE-2024-57981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981" }, { "name": "CVE-2024-57986", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57986" }, { "name": "CVE-2024-57993", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57993" }, { "name": "CVE-2024-57997", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57997" }, { "name": "CVE-2024-58007", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58007" }, { "name": "CVE-2024-58009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009" }, { "name": "CVE-2024-58011", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011" }, { "name": "CVE-2024-58013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013" }, { "name": "CVE-2024-58017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017" }, { "name": "CVE-2024-58020", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58020" }, { "name": "CVE-2024-58034", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58034" }, { "name": "CVE-2024-58051", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58051" }, { "name": "CVE-2024-58052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052" }, { "name": "CVE-2024-58054", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58054" }, { "name": "CVE-2024-58055", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58055" }, { "name": "CVE-2024-58056", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58056" }, { "name": "CVE-2024-58058", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58058" }, { "name": "CVE-2024-58061", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58061" }, { "name": "CVE-2024-58063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063" }, { "name": "CVE-2024-58069", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58069" }, { "name": "CVE-2024-58072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072" }, { "name": "CVE-2024-58076", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58076" }, { "name": "CVE-2024-58080", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58080" }, { "name": "CVE-2024-58083", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083" }, { "name": "CVE-2024-58085", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58085" }, { "name": "CVE-2024-58086", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58086" }, { "name": "CVE-2025-21701", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21701" }, { "name": "CVE-2025-21703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703" }, { "name": "CVE-2025-21704", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21704" }, { "name": "CVE-2025-21706", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21706" }, { "name": "CVE-2025-21708", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708" }, { "name": "CVE-2025-21711", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21711" }, { "name": "CVE-2025-21726", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726" }, { "name": "CVE-2025-21727", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21727" }, { "name": "CVE-2025-21731", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21731" }, { "name": "CVE-2025-21734", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21734" }, { "name": "CVE-2025-21735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735" }, { "name": "CVE-2025-21736", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21736" }, { "name": "CVE-2025-21738", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21738" }, { "name": "CVE-2025-21744", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744" }, { "name": "CVE-2025-21745", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21745" }, { "name": "CVE-2025-21749", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21749" }, { "name": "CVE-2025-21750", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750" }, { "name": "CVE-2025-21760", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760" }, { "name": "CVE-2025-21761", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21761" }, { "name": "CVE-2025-21762", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762" }, { "name": "CVE-2025-21763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763" }, { "name": "CVE-2025-21764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764" }, { "name": "CVE-2025-21765", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765" }, { "name": "CVE-2025-21766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766" }, { "name": "CVE-2025-21775", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21775" }, { "name": "CVE-2025-21776", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776" }, { "name": "CVE-2025-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779" }, { "name": "CVE-2025-21781", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21781" }, { "name": "CVE-2025-21782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-21794", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21794" }, { "name": "CVE-2025-21796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796" }, { "name": "CVE-2025-21804", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21804" }, { "name": "CVE-2025-21819", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21819" }, { "name": "CVE-2025-21820", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21820" }, { "name": "CVE-2025-21821", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821" }, { "name": "CVE-2025-21823", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21823" }, { "name": "CVE-2025-21829", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21829" }, { "name": "CVE-2025-21830", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21830" }, { "name": "CVE-2025-21832", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21832" }, { "name": "CVE-2025-21835", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21835" }, { "name": "CVE-2021-4454", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4454" }, { "name": "CVE-2022-49053", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49053" }, { "name": "CVE-2022-49056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49056" }, { "name": "CVE-2022-49057", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49057" }, { "name": "CVE-2022-49062", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49062" }, { "name": "CVE-2022-49064", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49064" }, { "name": "CVE-2022-49070", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49070" }, { "name": "CVE-2022-49071", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49071" }, { "name": "CVE-2022-49075", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49075" }, { "name": "CVE-2022-49123", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49123" }, { "name": "CVE-2022-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49125" }, { "name": "CVE-2022-49133", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49133" }, { "name": "CVE-2022-49136", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49136" }, { "name": "CVE-2022-49138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138" }, { "name": "CVE-2022-49139", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139" }, { "name": "CVE-2022-49144", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49144" }, { "name": "CVE-2022-49183", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49183" }, { "name": "CVE-2022-49192", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49192" }, { "name": "CVE-2022-49202", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49202" }, { "name": "CVE-2022-49203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49203" }, { "name": "CVE-2022-49204", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49204" }, { "name": "CVE-2022-49205", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49205" }, { "name": "CVE-2022-49207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49207" }, { "name": "CVE-2022-49209", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49209" }, { "name": "CVE-2022-49215", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49215" }, { "name": "CVE-2022-49219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49219" }, { "name": "CVE-2022-49225", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49225" }, { "name": "CVE-2022-49228", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49228" }, { "name": "CVE-2022-49230", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49230" }, { "name": "CVE-2022-49233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49233" }, { "name": "CVE-2022-49237", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49237" }, { "name": "CVE-2022-49238", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49238" }, { "name": "CVE-2022-49293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49293" }, { "name": "CVE-2022-49296", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49296" }, { "name": "CVE-2022-49306", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49306" }, { "name": "CVE-2022-49325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49325" }, { "name": "CVE-2022-49329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49329" }, { "name": "CVE-2022-49330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49330" }, { "name": "CVE-2022-49333", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49333" }, { "name": "CVE-2022-49338", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49338" }, { "name": "CVE-2022-49353", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49353" }, { "name": "CVE-2022-49359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49359" }, { "name": "CVE-2022-49362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49362" }, { "name": "CVE-2022-49365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49365" }, { "name": "CVE-2022-49390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49390" }, { "name": "CVE-2022-49406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49406" }, { "name": "CVE-2022-49419", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49419" }, { "name": "CVE-2022-49436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49436" }, { "name": "CVE-2022-49446", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49446" }, { "name": "CVE-2022-49458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49458" }, { "name": "CVE-2022-49465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49465" }, { "name": "CVE-2022-49470", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49470" }, { "name": "CVE-2022-49476", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49476" }, { "name": "CVE-2022-49479", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49479" }, { "name": "CVE-2022-49483", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49483" }, { "name": "CVE-2022-49484", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49484" }, { "name": "CVE-2022-49485", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49485" }, { "name": "CVE-2022-49497", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49497" }, { "name": "CVE-2022-49499", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49499" }, { "name": "CVE-2022-49510", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49510" }, { "name": "CVE-2022-49511", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49511" }, { "name": "CVE-2022-49516", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49516" }, { "name": "CVE-2022-49518", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49518" }, { "name": "CVE-2022-49529", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49529" }, { "name": "CVE-2022-49530", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49530" }, { "name": "CVE-2022-49533", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49533" }, { "name": "CVE-2022-49538", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49538" }, { "name": "CVE-2022-49543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49543" }, { "name": "CVE-2022-49548", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49548" }, { "name": "CVE-2022-49552", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49552" }, { "name": "CVE-2022-49560", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49560" }, { "name": "CVE-2022-49565", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49565" }, { "name": "CVE-2022-49624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49624" }, { "name": "CVE-2022-49635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49635" }, { "name": "CVE-2022-49638", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49638" }, { "name": "CVE-2022-49650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49650" }, { "name": "CVE-2022-49655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49655" }, { "name": "CVE-2022-49658", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49658" }, { "name": "CVE-2022-49686", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49686" }, { "name": "CVE-2022-49694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49694" }, { "name": "CVE-2022-49697", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49697" }, { "name": "CVE-2022-49732", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49732" }, { "name": "CVE-2022-49739", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49739" }, { "name": "CVE-2022-49746", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49746" }, { "name": "CVE-2022-49748", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49748" }, { "name": "CVE-2022-49751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49751" }, { "name": "CVE-2022-49753", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49753" }, { "name": "CVE-2022-49755", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49755" }, { "name": "CVE-2022-49759", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49759" }, { "name": "CVE-2023-52831", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52831" }, { "name": "CVE-2023-52927", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52927" }, { "name": "CVE-2023-52930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52930" }, { "name": "CVE-2023-52933", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52933" }, { "name": "CVE-2023-52935", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52935" }, { "name": "CVE-2023-52939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52939" }, { "name": "CVE-2023-52941", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52941" }, { "name": "CVE-2023-52973", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52973" }, { "name": "CVE-2023-52974", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52974" }, { "name": "CVE-2023-52975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975" }, { "name": "CVE-2023-52976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52976" }, { "name": "CVE-2023-52979", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52979" }, { "name": "CVE-2023-52983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52983" }, { "name": "CVE-2023-52984", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52984" }, { "name": "CVE-2023-52988", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52988" }, { "name": "CVE-2023-52989", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52989" }, { "name": "CVE-2023-52992", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52992" }, { "name": "CVE-2023-52993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52993" }, { "name": "CVE-2023-53000", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53000" }, { "name": "CVE-2023-53005", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53005" }, { "name": "CVE-2023-53006", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53006" }, { "name": "CVE-2023-53007", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53007" }, { "name": "CVE-2023-53008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53008" }, { "name": "CVE-2023-53010", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53010" }, { "name": "CVE-2023-53015", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53015" }, { "name": "CVE-2023-53016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53016" }, { "name": "CVE-2023-53019", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53019" }, { "name": "CVE-2023-53023", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53023" }, { "name": "CVE-2023-53024", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53024" }, { "name": "CVE-2023-53025", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53025" }, { "name": "CVE-2023-53026", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53026" }, { "name": "CVE-2023-53028", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53028" }, { "name": "CVE-2023-53029", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53029" }, { "name": "CVE-2023-53030", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53030" }, { "name": "CVE-2023-53033", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53033" }, { "name": "CVE-2024-41149", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41149" }, { "name": "CVE-2024-46736", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46736" }, { "name": "CVE-2024-46796", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46796" }, { "name": "CVE-2024-52559", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559" }, { "name": "CVE-2024-57947", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57947" }, { "name": "CVE-2024-57974", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57974" }, { "name": "CVE-2024-57990", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57990" }, { "name": "CVE-2024-57999", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57999" }, { "name": "CVE-2024-58002", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58002" }, { "name": "CVE-2024-58005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005" }, { "name": "CVE-2024-58006", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58006" }, { "name": "CVE-2024-58012", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58012" }, { "name": "CVE-2024-58019", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58019" }, { "name": "CVE-2024-58057", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58057" }, { "name": "CVE-2024-58078", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58078" }, { "name": "CVE-2024-58079", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58079" }, { "name": "CVE-2025-21693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693" }, { "name": "CVE-2025-21714", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21714" }, { "name": "CVE-2025-21723", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21723" }, { "name": "CVE-2025-21732", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21732" }, { "name": "CVE-2025-21739", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21739" }, { "name": "CVE-2025-21741", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21741" }, { "name": "CVE-2025-21742", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21742" }, { "name": "CVE-2025-21743", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21743" }, { "name": "CVE-2025-21756", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21756" }, { "name": "CVE-2025-21759", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759" }, { "name": "CVE-2025-21773", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21773" }, { "name": "CVE-2025-21784", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21784" }, { "name": "CVE-2025-21793", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21793" }, { "name": "CVE-2025-21810", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21810" }, { "name": "CVE-2025-21815", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21815" }, { "name": "CVE-2025-21825", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21825" }, { "name": "CVE-2025-21828", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21828" }, { "name": "CVE-2025-21831", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21831" }, { "name": "CVE-2025-21838", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21838" }, { "name": "CVE-2025-21839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839" }, { "name": "CVE-2025-21844", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21844" }, { "name": "CVE-2025-21846", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846" }, { "name": "CVE-2025-21847", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21847" }, { "name": "CVE-2025-21848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848" }, { "name": "CVE-2025-21850", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21850" }, { "name": "CVE-2025-21855", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855" }, { "name": "CVE-2025-21856", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21856" }, { "name": "CVE-2025-21857", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21857" }, { "name": "CVE-2025-21858", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858" }, { "name": "CVE-2025-21859", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21859" }, { "name": "CVE-2025-21861", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861" }, { "name": "CVE-2025-21862", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862" }, { "name": "CVE-2025-21864", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21864" }, { "name": "CVE-2025-21865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865" }, { "name": "CVE-2025-21866", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21866" }, { "name": "CVE-2025-21869", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21869" }, { "name": "CVE-2025-21870", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21870" }, { "name": "CVE-2025-21871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871" }, { "name": "CVE-2025-21876", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21876" }, { "name": "CVE-2025-21877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877" }, { "name": "CVE-2025-21878", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21878" }, { "name": "CVE-2025-21883", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883" }, { "name": "CVE-2025-21885", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21885" }, { "name": "CVE-2025-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886" }, { "name": "CVE-2025-21888", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21888" }, { "name": "CVE-2025-21890", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21890" }, { "name": "CVE-2025-21891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891" }, { "name": "CVE-2025-21892", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21892" } ], "initial_release_date": "2025-04-11T00:00:00", "last_revision_date": "2025-04-11T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0307", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-11T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1177-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251177-1" }, { "published_at": "2025-04-09", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1180-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251180-1" }, { "published_at": "2025-04-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1194-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251194-1" }, { "published_at": "2025-04-10", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1195-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251195-1" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1178-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251178-1" }, { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1176-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251176-1" }, { "published_at": "2025-04-09", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1183-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251183-1" } ] }
CERTFR-2025-AVI-0336
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | N/A | SUSE Manager Proxy 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | N/A | openSUSE Leap 15.4 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | N/A | openSUSE Leap 15.5 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | N/A | openSUSE Leap 15.6 | ||
SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
SUSE | N/A | SUSE Manager Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | N/A | openSUSE Leap 15.3 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "name": "CVE-2020-27835", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27835" }, { "name": "CVE-2022-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1016" }, { "name": "CVE-2022-1184", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1184" }, { "name": "CVE-2022-1048", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1048" }, { "name": "CVE-2022-26373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26373" }, { "name": "CVE-2022-0168", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0168" }, { "name": "CVE-2022-3435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3435" }, { "name": "CVE-2022-29901", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29901" }, { "name": "CVE-2022-29900", "url": "https://www.cve.org/CVERecord?id=CVE-2022-29900" }, { "name": "CVE-2022-2977", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2977" }, { "name": "CVE-2022-3303", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3303" }, { "name": "CVE-2023-0179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0179" }, { "name": "CVE-2023-1652", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1652" }, { "name": "CVE-2023-28410", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28410" }, { "name": "CVE-2023-2162", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2162" }, { "name": "CVE-2023-3567", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3567" }, { "name": "CVE-2021-46925", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46925" }, { "name": "CVE-2024-26634", "url": "https://www.cve.org/CVERecord?id=CVE-2024-26634" }, { "name": "CVE-2021-47248", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47248" }, { "name": "CVE-2024-35910", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35910" }, { "name": "CVE-2024-38559", "url": "https://www.cve.org/CVERecord?id=CVE-2024-38559" }, { "name": "CVE-2024-41005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41005" }, { "name": "CVE-2024-36968", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36968" }, { "name": "CVE-2024-41090", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41090" }, { "name": "CVE-2021-47517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47517" }, { "name": "CVE-2022-49014", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49014" }, { "name": "CVE-2024-49935", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49935" }, { "name": "CVE-2024-50269", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50269" }, { "name": "CVE-2024-50290", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50290" }, { "name": "CVE-2024-53063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53063" }, { "name": "CVE-2024-47678", "url": "https://www.cve.org/CVERecord?id=CVE-2024-47678" }, { "name": "CVE-2024-53140", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53140" }, { "name": "CVE-2024-56642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642" }, { "name": "CVE-2024-56651", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56651" }, { "name": "CVE-2024-56600", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56600" }, { "name": "CVE-2024-53124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124" }, { "name": "CVE-2024-56633", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56633" }, { "name": "CVE-2024-49940", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49940" }, { "name": "CVE-2024-53176", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53176" }, { "name": "CVE-2024-53178", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53178" }, { "name": "CVE-2024-49571", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49571" }, { "name": "CVE-2024-53680", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53680" }, { "name": "CVE-2024-56640", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56640" }, { "name": "CVE-2024-56770", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56770" }, { "name": "CVE-2024-57900", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57900" }, { "name": "CVE-2021-47633", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47633" }, { "name": "CVE-2021-47644", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47644" }, { "name": "CVE-2022-49076", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49076" }, { "name": "CVE-2022-49089", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49089" }, { "name": "CVE-2022-49134", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49134" }, { "name": "CVE-2022-49135", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49135" }, { "name": "CVE-2022-49151", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49151" }, { "name": "CVE-2022-49178", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49178" }, { "name": "CVE-2022-49182", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49182" }, { "name": "CVE-2022-49201", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49201" }, { "name": "CVE-2022-49247", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49247" }, { "name": "CVE-2022-49490", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49490" }, { "name": "CVE-2022-49626", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49626" }, { "name": "CVE-2022-49661", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49661" }, { "name": "CVE-2024-57979", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57979" }, { "name": "CVE-2025-21802", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21802" }, { "name": "CVE-2021-4453", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4453" }, { "name": "CVE-2021-47631", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47631" }, { "name": "CVE-2021-47632", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47632" }, { "name": "CVE-2021-47635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47635" }, { "name": "CVE-2021-47636", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47636" }, { "name": "CVE-2021-47637", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47637" }, { "name": "CVE-2021-47638", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47638" }, { "name": "CVE-2021-47639", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47639" }, { "name": "CVE-2021-47641", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47641" }, { "name": "CVE-2021-47642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47642" }, { "name": "CVE-2021-47643", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47643" }, { "name": "CVE-2021-47645", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47645" }, { "name": "CVE-2021-47646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47646" }, { "name": "CVE-2021-47647", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47647" }, { "name": "CVE-2021-47648", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47648" }, { "name": "CVE-2021-47649", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47649" }, { "name": "CVE-2021-47650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47650" }, { "name": "CVE-2021-47651", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47651" }, { "name": "CVE-2021-47652", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47652" }, { "name": "CVE-2021-47653", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47653" }, { "name": "CVE-2021-47654", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47654" }, { "name": "CVE-2021-47656", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47656" }, { "name": "CVE-2021-47657", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47657" }, { "name": "CVE-2021-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47659" }, { "name": "CVE-2022-0995", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0995" }, { "name": "CVE-2022-49044", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49044" }, { "name": "CVE-2022-49050", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49050" }, { "name": "CVE-2022-49051", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49051" }, { "name": "CVE-2022-49054", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49054" }, { "name": "CVE-2022-49055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49055" }, { "name": "CVE-2022-49058", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49058" }, { "name": "CVE-2022-49059", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49059" }, { "name": "CVE-2022-49060", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49060" }, { "name": "CVE-2022-49061", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49061" }, { "name": "CVE-2022-49063", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063" }, { "name": "CVE-2022-49065", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49065" }, { "name": "CVE-2022-49066", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49066" }, { "name": "CVE-2022-49073", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49073" }, { "name": "CVE-2022-49074", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49074" }, { "name": "CVE-2022-49078", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49078" }, { "name": "CVE-2022-49082", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49082" }, { "name": "CVE-2022-49083", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49083" }, { "name": "CVE-2022-49084", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49084" }, { "name": "CVE-2022-49085", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49085" }, { "name": "CVE-2022-49086", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49086" }, { "name": "CVE-2022-49088", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49088" }, { "name": "CVE-2022-49090", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49090" }, { "name": "CVE-2022-49091", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49091" }, { "name": "CVE-2022-49092", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49092" }, { "name": "CVE-2022-49093", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49093" }, { "name": "CVE-2022-49095", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49095" }, { "name": "CVE-2022-49096", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49096" }, { "name": "CVE-2022-49097", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49097" }, { "name": "CVE-2022-49098", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49098" }, { "name": "CVE-2022-49099", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49099" }, { "name": "CVE-2022-49100", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49100" }, { "name": "CVE-2022-49102", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49102" }, { "name": "CVE-2022-49103", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49103" }, { "name": "CVE-2022-49104", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49104" }, { "name": "CVE-2022-49105", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49105" }, { "name": "CVE-2022-49106", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49106" }, { "name": "CVE-2022-49107", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49107" }, { "name": "CVE-2022-49109", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49109" }, { "name": "CVE-2022-49111", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49111" }, { "name": "CVE-2022-49112", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49112" }, { "name": "CVE-2022-49113", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49113" }, { "name": "CVE-2022-49114", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49114" }, { "name": "CVE-2022-49115", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49115" }, { "name": "CVE-2022-49116", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49116" }, { "name": "CVE-2022-49118", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49118" }, { "name": "CVE-2022-49119", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49119" }, { "name": "CVE-2022-49120", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49120" }, { "name": "CVE-2022-49121", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49121" }, { "name": "CVE-2022-49122", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49122" }, { "name": "CVE-2022-49126", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49126" }, { "name": "CVE-2022-49128", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49128" }, { "name": "CVE-2022-49129", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49129" }, { "name": "CVE-2022-49130", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49130" }, { "name": "CVE-2022-49131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49131" }, { "name": "CVE-2022-49132", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49132" }, { "name": "CVE-2022-49137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49137" }, { "name": "CVE-2022-49145", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49145" }, { "name": "CVE-2022-49147", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49147" }, { "name": "CVE-2022-49148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49148" }, { "name": "CVE-2022-49153", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49153" }, { "name": "CVE-2022-49154", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49154" }, { "name": "CVE-2022-49155", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49155" }, { "name": "CVE-2022-49156", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49156" }, { "name": "CVE-2022-49157", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49157" }, { "name": "CVE-2022-49158", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49158" }, { "name": "CVE-2022-49159", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49159" }, { "name": "CVE-2022-49160", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49160" }, { "name": "CVE-2022-49162", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49162" }, { "name": "CVE-2022-49163", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49163" }, { "name": "CVE-2022-49164", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49164" }, { "name": "CVE-2022-49165", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49165" }, { "name": "CVE-2022-49174", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49174" }, { "name": "CVE-2022-49175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49175" }, { "name": "CVE-2022-49176", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49176" }, { "name": "CVE-2022-49177", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49177" }, { "name": "CVE-2022-49179", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49179" }, { "name": "CVE-2022-49180", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49180" }, { "name": "CVE-2022-49185", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49185" }, { "name": "CVE-2022-49187", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49187" }, { "name": "CVE-2022-49188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49188" }, { "name": "CVE-2022-49189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49189" }, { "name": "CVE-2022-49193", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49193" }, { "name": "CVE-2022-49194", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49194" }, { "name": "CVE-2022-49196", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49196" }, { "name": "CVE-2022-49199", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49199" }, { "name": "CVE-2022-49200", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49200" }, { "name": "CVE-2022-49206", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49206" }, { "name": "CVE-2022-49208", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49208" }, { "name": "CVE-2022-49212", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49212" }, { "name": "CVE-2022-49213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49213" }, { "name": "CVE-2022-49214", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49214" }, { "name": "CVE-2022-49216", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49216" }, { "name": "CVE-2022-49217", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49217" }, { "name": "CVE-2022-49218", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49218" }, { "name": "CVE-2022-49221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49221" }, { "name": "CVE-2022-49222", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49222" }, { "name": "CVE-2022-49224", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49224" }, { "name": "CVE-2022-49226", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49226" }, { "name": "CVE-2022-49227", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49227" }, { "name": "CVE-2022-49232", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49232" }, { "name": "CVE-2022-49235", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49235" }, { "name": "CVE-2022-49236", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49236" }, { "name": "CVE-2022-49239", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49239" }, { "name": "CVE-2022-49241", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49241" }, { "name": "CVE-2022-49242", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49242" }, { "name": "CVE-2022-49243", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49243" }, { "name": "CVE-2022-49244", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49244" }, { "name": "CVE-2022-49246", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49246" }, { "name": "CVE-2022-49248", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49248" }, { "name": "CVE-2022-49249", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49249" }, { "name": "CVE-2022-49250", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49250" }, { "name": "CVE-2022-49251", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49251" }, { "name": "CVE-2022-49252", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49252" }, { "name": "CVE-2022-49253", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49253" }, { "name": "CVE-2022-49254", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49254" }, { "name": "CVE-2022-49256", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49256" }, { "name": "CVE-2022-49257", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49257" }, { "name": "CVE-2022-49258", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49258" }, { "name": "CVE-2022-49259", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49259" }, { "name": "CVE-2022-49260", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49260" }, { "name": "CVE-2022-49261", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49261" }, { "name": "CVE-2022-49262", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49262" }, { "name": "CVE-2022-49263", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49263" }, { "name": "CVE-2022-49264", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49264" }, { "name": "CVE-2022-49265", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49265" }, { "name": "CVE-2022-49266", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49266" }, { "name": "CVE-2022-49268", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49268" }, { "name": "CVE-2022-49269", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49269" }, { "name": "CVE-2022-49270", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49270" }, { "name": "CVE-2022-49271", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49271" }, { "name": "CVE-2022-49272", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49272" }, { "name": "CVE-2022-49273", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49273" }, { "name": "CVE-2022-49274", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49274" }, { "name": "CVE-2022-49275", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49275" }, { "name": "CVE-2022-49276", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49276" }, { "name": "CVE-2022-49277", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49277" }, { "name": "CVE-2022-49278", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49278" }, { "name": "CVE-2022-49279", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49279" }, { "name": "CVE-2022-49280", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49280" }, { "name": "CVE-2022-49281", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49281" }, { "name": "CVE-2022-49283", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49283" }, { "name": "CVE-2022-49285", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49285" }, { "name": "CVE-2022-49286", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49286" }, { "name": "CVE-2022-49287", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49287" }, { "name": "CVE-2022-49288", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49288" }, { "name": "CVE-2022-49290", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49290" }, { "name": "CVE-2022-49291", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49291" }, { "name": "CVE-2022-49292", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49292" }, { "name": "CVE-2022-49294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49294" }, { "name": "CVE-2022-49295", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49295" }, { "name": "CVE-2022-49297", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49297" }, { "name": "CVE-2022-49298", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49298" }, { "name": "CVE-2022-49299", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49299" }, { "name": "CVE-2022-49300", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49300" }, { "name": "CVE-2022-49301", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49301" }, { "name": "CVE-2022-49302", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49302" }, { "name": "CVE-2022-49304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49304" }, { "name": "CVE-2022-49305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49305" }, { "name": "CVE-2022-49307", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49307" }, { "name": "CVE-2022-49308", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49308" }, { "name": "CVE-2022-49309", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49309" }, { "name": "CVE-2022-49310", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49310" }, { "name": "CVE-2022-49311", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49311" }, { "name": "CVE-2022-49312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49312" }, { "name": "CVE-2022-49313", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49313" }, { "name": "CVE-2022-49314", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49314" }, { "name": "CVE-2022-49315", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49315" }, { "name": "CVE-2022-49316", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49316" }, { "name": "CVE-2022-49319", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49319" }, { "name": "CVE-2022-49320", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49320" }, { "name": "CVE-2022-49321", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49321" }, { "name": "CVE-2022-49322", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49322" }, { "name": "CVE-2022-49323", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49323" }, { "name": "CVE-2022-49326", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49326" }, { "name": "CVE-2022-49327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49327" }, { "name": "CVE-2022-49328", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49328" }, { "name": "CVE-2022-49331", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49331" }, { "name": "CVE-2022-49332", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49332" }, { "name": "CVE-2022-49335", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49335" }, { "name": "CVE-2022-49336", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49336" }, { "name": "CVE-2022-49337", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49337" }, { "name": "CVE-2022-49339", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49339" }, { "name": "CVE-2022-49341", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49341" }, { "name": "CVE-2022-49342", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49342" }, { "name": "CVE-2022-49343", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49343" }, { "name": "CVE-2022-49345", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49345" }, { "name": "CVE-2022-49346", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49346" }, { "name": "CVE-2022-49347", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49347" }, { "name": "CVE-2022-49348", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49348" }, { "name": "CVE-2022-49349", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49349" }, { "name": "CVE-2022-49350", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49350" }, { "name": "CVE-2022-49351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49351" }, { "name": "CVE-2022-49352", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49352" }, { "name": "CVE-2022-49354", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49354" }, { "name": "CVE-2022-49356", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49356" }, { "name": "CVE-2022-49357", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49357" }, { "name": "CVE-2022-49367", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49367" }, { "name": "CVE-2022-49368", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49368" }, { "name": "CVE-2022-49370", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49370" }, { "name": "CVE-2022-49371", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49371" }, { "name": "CVE-2022-49373", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49373" }, { "name": "CVE-2022-49375", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49375" }, { "name": "CVE-2022-49376", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49376" }, { "name": "CVE-2022-49377", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49377" }, { "name": "CVE-2022-49378", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49378" }, { "name": "CVE-2022-49379", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49379" }, { "name": "CVE-2022-49381", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49381" }, { "name": "CVE-2022-49382", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49382" }, { "name": "CVE-2022-49384", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49384" }, { "name": "CVE-2022-49385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49385" }, { "name": "CVE-2022-49386", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49386" }, { "name": "CVE-2022-49389", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49389" }, { "name": "CVE-2022-49392", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49392" }, { "name": "CVE-2022-49394", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49394" }, { "name": "CVE-2022-49396", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49396" }, { "name": "CVE-2022-49397", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49397" }, { "name": "CVE-2022-49398", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49398" }, { "name": "CVE-2022-49399", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49399" }, { "name": "CVE-2022-49400", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49400" }, { "name": "CVE-2022-49402", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49402" }, { "name": "CVE-2022-49404", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49404" }, { "name": "CVE-2022-49407", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49407" }, { "name": "CVE-2022-49409", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49409" }, { "name": "CVE-2022-49410", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49410" }, { "name": "CVE-2022-49411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49411" }, { "name": "CVE-2022-49412", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49412" }, { "name": "CVE-2022-49413", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49413" }, { "name": "CVE-2022-49414", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49414" }, { "name": "CVE-2022-49416", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49416" }, { "name": "CVE-2022-49418", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49418" }, { "name": "CVE-2022-49421", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49421" }, { "name": "CVE-2022-49422", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49422" }, { "name": "CVE-2022-49424", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49424" }, { "name": "CVE-2022-49426", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49426" }, { "name": "CVE-2022-49427", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49427" }, { "name": "CVE-2022-49429", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49429" }, { "name": "CVE-2022-49430", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49430" }, { "name": "CVE-2022-49431", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49431" }, { "name": "CVE-2022-49432", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49432" }, { "name": "CVE-2022-49433", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49433" }, { "name": "CVE-2022-49434", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49434" }, { "name": "CVE-2022-49435", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49435" }, { "name": "CVE-2022-49437", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49437" }, { "name": "CVE-2022-49438", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49438" }, { "name": "CVE-2022-49440", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49440" }, { "name": "CVE-2022-49441", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49441" }, { "name": "CVE-2022-49442", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49442" }, { "name": "CVE-2022-49443", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49443" }, { "name": "CVE-2022-49444", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49444" }, { "name": "CVE-2022-49445", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49445" }, { "name": "CVE-2022-49447", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49447" }, { "name": "CVE-2022-49448", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49448" }, { "name": "CVE-2022-49449", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49449" }, { "name": "CVE-2022-49451", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49451" }, { "name": "CVE-2022-49453", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49453" }, { "name": "CVE-2022-49455", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49455" }, { "name": "CVE-2022-49459", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49459" }, { "name": "CVE-2022-49460", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49460" }, { "name": "CVE-2022-49462", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49462" }, { "name": "CVE-2022-49463", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49463" }, { "name": "CVE-2022-49466", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49466" }, { "name": "CVE-2022-49467", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49467" }, { "name": "CVE-2022-49468", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49468" }, { "name": "CVE-2022-49472", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49472" }, { "name": "CVE-2022-49473", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49473" }, { "name": "CVE-2022-49474", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49474" }, { "name": "CVE-2022-49475", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49475" }, { "name": "CVE-2022-49477", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49477" }, { "name": "CVE-2022-49478", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49478" }, { "name": "CVE-2022-49480", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49480" }, { "name": "CVE-2022-49481", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49481" }, { "name": "CVE-2022-49482", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49482" }, { "name": "CVE-2022-49486", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49486" }, { "name": "CVE-2022-49487", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49487" }, { "name": "CVE-2022-49488", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49488" }, { "name": "CVE-2022-49489", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49489" }, { "name": "CVE-2022-49491", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49491" }, { "name": "CVE-2022-49492", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49492" }, { "name": "CVE-2022-49493", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49493" }, { "name": "CVE-2022-49494", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49494" }, { "name": "CVE-2022-49495", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49495" }, { "name": "CVE-2022-49498", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49498" }, { "name": "CVE-2022-49501", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49501" }, { "name": "CVE-2022-49502", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49502" }, { "name": "CVE-2022-49503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49503" }, { "name": "CVE-2022-49504", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49504" }, { "name": "CVE-2022-49505", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49505" }, { "name": "CVE-2022-49506", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49506" }, { "name": "CVE-2022-49507", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49507" }, { "name": "CVE-2022-49508", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49508" }, { "name": "CVE-2022-49509", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49509" }, { "name": "CVE-2022-49512", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49512" }, { "name": "CVE-2022-49514", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49514" }, { "name": "CVE-2022-49515", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49515" }, { "name": "CVE-2022-49517", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49517" }, { "name": "CVE-2022-49519", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49519" }, { "name": "CVE-2022-49520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49520" }, { "name": "CVE-2022-49521", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49521" }, { "name": "CVE-2022-49522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49522" }, { "name": "CVE-2022-49523", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49523" }, { "name": "CVE-2022-49524", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49524" }, { "name": "CVE-2022-49525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49525" }, { "name": "CVE-2022-49526", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49526" }, { "name": "CVE-2022-49527", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49527" }, { "name": "CVE-2022-49532", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49532" }, { "name": "CVE-2022-49534", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49534" }, { "name": "CVE-2022-49535", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535" }, { "name": "CVE-2022-49536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49536" }, { "name": "CVE-2022-49537", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49537" }, { "name": "CVE-2022-49541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49541" }, { "name": "CVE-2022-49542", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49542" }, { "name": "CVE-2022-49544", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49544" }, { "name": "CVE-2022-49545", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49545" }, { "name": "CVE-2022-49546", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49546" }, { "name": "CVE-2022-49549", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49549" }, { "name": "CVE-2022-49551", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49551" }, { "name": "CVE-2022-49555", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49555" }, { "name": "CVE-2022-49556", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49556" }, { "name": "CVE-2022-49559", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49559" }, { "name": "CVE-2022-49562", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49562" }, { "name": "CVE-2022-49563", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49563" }, { "name": "CVE-2022-49564", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49564" }, { "name": "CVE-2022-49566", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49566" }, { "name": "CVE-2022-49568", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49568" }, { "name": "CVE-2022-49569", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49569" }, { "name": "CVE-2022-49570", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49570" }, { "name": "CVE-2022-49579", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49579" }, { "name": "CVE-2022-49581", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49581" }, { "name": "CVE-2022-49583", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49583" }, { "name": "CVE-2022-49584", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49584" }, { "name": "CVE-2022-49591", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49591" }, { "name": "CVE-2022-49592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49592" }, { "name": "CVE-2022-49603", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49603" }, { "name": "CVE-2022-49605", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49605" }, { "name": "CVE-2022-49606", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49606" }, { "name": "CVE-2022-49607", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49607" }, { "name": "CVE-2022-49609", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49609" }, { "name": "CVE-2022-49610", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49610" }, { "name": "CVE-2022-49611", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49611" }, { "name": "CVE-2022-49613", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49613" }, { "name": "CVE-2022-49615", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49615" }, { "name": "CVE-2022-49616", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49616" }, { "name": "CVE-2022-49617", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49617" }, { "name": "CVE-2022-49618", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49618" }, { "name": "CVE-2022-49621", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49621" }, { "name": "CVE-2022-49623", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49623" }, { "name": "CVE-2022-49625", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49625" }, { "name": "CVE-2022-49627", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49627" }, { "name": "CVE-2022-49628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49628" }, { "name": "CVE-2022-49631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49631" }, { "name": "CVE-2022-49634", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49634" }, { "name": "CVE-2022-49640", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49640" }, { "name": "CVE-2022-49641", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49641" }, { "name": "CVE-2022-49642", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49642" }, { "name": "CVE-2022-49643", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49643" }, { "name": "CVE-2022-49644", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49644" }, { "name": "CVE-2022-49645", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49645" }, { "name": "CVE-2022-49646", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49646" }, { "name": "CVE-2022-49647", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49647" }, { "name": "CVE-2022-49648", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49648" }, { "name": "CVE-2022-49649", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49649" }, { "name": "CVE-2022-49652", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49652" }, { "name": "CVE-2022-49653", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49653" }, { "name": "CVE-2022-49656", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49656" }, { "name": "CVE-2022-49657", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49657" }, { "name": "CVE-2022-49663", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49663" }, { "name": "CVE-2022-49665", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49665" }, { "name": "CVE-2022-49667", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49667" }, { "name": "CVE-2022-49668", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49668" }, { "name": "CVE-2022-49670", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49670" }, { "name": "CVE-2022-49671", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49671" }, { "name": "CVE-2022-49672", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49672" }, { "name": "CVE-2022-49673", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49673" }, { "name": "CVE-2022-49674", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49674" }, { "name": "CVE-2022-49675", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49675" }, { "name": "CVE-2022-49676", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49676" }, { "name": "CVE-2022-49677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49677" }, { "name": "CVE-2022-49678", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49678" }, { "name": "CVE-2022-49679", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49679" }, { "name": "CVE-2022-49680", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49680" }, { "name": "CVE-2022-49683", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49683" }, { "name": "CVE-2022-49685", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49685" }, { "name": "CVE-2022-49687", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49687" }, { "name": "CVE-2022-49688", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49688" }, { "name": "CVE-2022-49693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49693" }, { "name": "CVE-2022-49695", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49695" }, { "name": "CVE-2022-49699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49699" }, { "name": "CVE-2022-49700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49700" }, { "name": "CVE-2022-49701", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49701" }, { "name": "CVE-2022-49703", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49703" }, { "name": "CVE-2022-49704", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49704" }, { "name": "CVE-2022-49705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49705" }, { "name": "CVE-2022-49707", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49707" }, { "name": "CVE-2022-49708", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49708" }, { "name": "CVE-2022-49710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49710" }, { "name": "CVE-2022-49711", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49711" }, { "name": "CVE-2022-49712", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49712" }, { "name": "CVE-2022-49713", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49713" }, { "name": "CVE-2022-49714", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49714" }, { "name": "CVE-2022-49715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49715" }, { "name": "CVE-2022-49716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49716" }, { "name": "CVE-2022-49719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49719" }, { "name": "CVE-2022-49720", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49720" }, { "name": "CVE-2022-49721", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49721" }, { "name": "CVE-2022-49722", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49722" }, { "name": "CVE-2022-49723", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49723" }, { "name": "CVE-2022-49724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49724" }, { "name": "CVE-2022-49725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49725" }, { "name": "CVE-2022-49726", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49726" }, { "name": "CVE-2022-49729", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49729" }, { "name": "CVE-2022-49730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49730" }, { "name": "CVE-2022-49731", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49731" }, { "name": "CVE-2022-49733", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49733" }, { "name": "CVE-2024-57996", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57996" }, { "name": "CVE-2024-58014", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58014" }, { "name": "CVE-2025-21718", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21718" }, { "name": "CVE-2025-21772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772" }, { "name": "CVE-2025-21780", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21780" }, { "name": "CVE-2025-21785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785" }, { "name": "CVE-2024-57973", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57973" }, { "name": "CVE-2024-58013", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58013" }, { "name": "CVE-2024-58052", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58052" }, { "name": "CVE-2024-58071", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071" }, { "name": "CVE-2024-58072", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58072" }, { "name": "CVE-2024-58083", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58083" }, { "name": "CVE-2025-21703", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21703" }, { "name": "CVE-2025-21708", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21708" }, { "name": "CVE-2025-21744", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21744" }, { "name": "CVE-2025-21760", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21760" }, { "name": "CVE-2025-21762", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21762" }, { "name": "CVE-2025-21763", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21763" }, { "name": "CVE-2025-21765", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21765" }, { "name": "CVE-2025-21766", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21766" }, { "name": "CVE-2025-21776", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21776" }, { "name": "CVE-2025-21782", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21782" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-21796", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21796" }, { "name": "CVE-2025-21821", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21821" }, { "name": "CVE-2021-4454", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4454" }, { "name": "CVE-2022-49053", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49053" }, { "name": "CVE-2022-49056", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49056" }, { "name": "CVE-2022-49057", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49057" }, { "name": "CVE-2022-49062", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49062" }, { "name": "CVE-2022-49064", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49064" }, { "name": "CVE-2022-49070", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49070" }, { "name": "CVE-2022-49071", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49071" }, { "name": "CVE-2022-49075", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49075" }, { "name": "CVE-2022-49123", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49123" }, { "name": "CVE-2022-49125", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49125" }, { "name": "CVE-2022-49133", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49133" }, { "name": "CVE-2022-49136", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49136" }, { "name": "CVE-2022-49138", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49138" }, { "name": "CVE-2022-49139", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139" }, { "name": "CVE-2022-49144", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49144" }, { "name": "CVE-2022-49183", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49183" }, { "name": "CVE-2022-49192", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49192" }, { "name": "CVE-2022-49202", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49202" }, { "name": "CVE-2022-49203", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49203" }, { "name": "CVE-2022-49204", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49204" }, { "name": "CVE-2022-49205", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49205" }, { "name": "CVE-2022-49207", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49207" }, { "name": "CVE-2022-49209", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49209" }, { "name": "CVE-2022-49215", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49215" }, { "name": "CVE-2022-49219", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49219" }, { "name": "CVE-2022-49225", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49225" }, { "name": "CVE-2022-49228", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49228" }, { "name": "CVE-2022-49230", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49230" }, { "name": "CVE-2022-49233", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49233" }, { "name": "CVE-2022-49237", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49237" }, { "name": "CVE-2022-49238", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49238" }, { "name": "CVE-2022-49293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49293" }, { "name": "CVE-2022-49296", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49296" }, { "name": "CVE-2022-49306", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49306" }, { "name": "CVE-2022-49325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49325" }, { "name": "CVE-2022-49329", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49329" }, { "name": "CVE-2022-49330", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49330" }, { "name": "CVE-2022-49333", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49333" }, { "name": "CVE-2022-49338", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49338" }, { "name": "CVE-2022-49353", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49353" }, { "name": "CVE-2022-49359", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49359" }, { "name": "CVE-2022-49362", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49362" }, { "name": "CVE-2022-49365", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49365" }, { "name": "CVE-2022-49390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49390" }, { "name": "CVE-2022-49406", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49406" }, { "name": "CVE-2022-49419", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49419" }, { "name": "CVE-2022-49436", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49436" }, { "name": "CVE-2022-49446", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49446" }, { "name": "CVE-2022-49458", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49458" }, { "name": "CVE-2022-49465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49465" }, { "name": "CVE-2022-49470", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49470" }, { "name": "CVE-2022-49476", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49476" }, { "name": "CVE-2022-49479", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49479" }, { "name": "CVE-2022-49483", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49483" }, { "name": "CVE-2022-49484", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49484" }, { "name": "CVE-2022-49485", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49485" }, { "name": "CVE-2022-49497", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49497" }, { "name": "CVE-2022-49499", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49499" }, { "name": "CVE-2022-49510", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49510" }, { "name": "CVE-2022-49511", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49511" }, { "name": "CVE-2022-49516", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49516" }, { "name": "CVE-2022-49518", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49518" }, { "name": "CVE-2022-49529", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49529" }, { "name": "CVE-2022-49530", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49530" }, { "name": "CVE-2022-49533", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49533" }, { "name": "CVE-2022-49538", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49538" }, { "name": "CVE-2022-49543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49543" }, { "name": "CVE-2022-49548", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49548" }, { "name": "CVE-2022-49552", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49552" }, { "name": "CVE-2022-49560", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49560" }, { "name": "CVE-2022-49565", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49565" }, { "name": "CVE-2022-49624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49624" }, { "name": "CVE-2022-49635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49635" }, { "name": "CVE-2022-49638", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49638" }, { "name": "CVE-2022-49650", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49650" }, { "name": "CVE-2022-49655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49655" }, { "name": "CVE-2022-49658", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49658" }, { "name": "CVE-2022-49686", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49686" }, { "name": "CVE-2022-49694", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49694" }, { "name": "CVE-2022-49697", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49697" }, { "name": "CVE-2022-49732", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49732" }, { "name": "CVE-2022-49739", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49739" }, { "name": "CVE-2022-49746", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49746" }, { "name": "CVE-2022-49748", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49748" }, { "name": "CVE-2022-49751", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49751" }, { "name": "CVE-2022-49753", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49753" }, { "name": "CVE-2022-49755", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49755" }, { "name": "CVE-2022-49759", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49759" }, { "name": "CVE-2023-52930", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52930" }, { "name": "CVE-2023-52933", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52933" }, { "name": "CVE-2023-52935", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52935" }, { "name": "CVE-2023-52939", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52939" }, { "name": "CVE-2023-52941", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52941" }, { "name": "CVE-2023-52973", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52973" }, { "name": "CVE-2023-52974", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52974" }, { "name": "CVE-2023-52975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52975" }, { "name": "CVE-2023-52976", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52976" }, { "name": "CVE-2023-52979", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52979" }, { "name": "CVE-2023-52983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52983" }, { "name": "CVE-2023-52984", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52984" }, { "name": "CVE-2023-52988", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52988" }, { "name": "CVE-2023-52989", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52989" }, { "name": "CVE-2023-52992", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52992" }, { "name": "CVE-2023-52993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52993" }, { "name": "CVE-2023-53000", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53000" }, { "name": "CVE-2023-53005", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53005" }, { "name": "CVE-2023-53006", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53006" }, { "name": "CVE-2023-53007", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53007" }, { "name": "CVE-2023-53008", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53008" }, { "name": "CVE-2023-53010", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53010" }, { "name": "CVE-2023-53015", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53015" }, { "name": "CVE-2023-53016", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53016" }, { "name": "CVE-2023-53019", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53019" }, { "name": "CVE-2023-53023", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53023" }, { "name": "CVE-2023-53024", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53024" }, { "name": "CVE-2023-53025", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53025" }, { "name": "CVE-2023-53026", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53026" }, { "name": "CVE-2023-53028", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53028" }, { "name": "CVE-2023-53029", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53029" }, { "name": "CVE-2023-53030", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53030" }, { "name": "CVE-2023-53033", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53033" }, { "name": "CVE-2025-21693", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21693" }, { "name": "CVE-2025-21759", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21759" }, { "name": "CVE-2025-21831", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21831" }, { "name": "CVE-2025-21846", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21846" }, { "name": "CVE-2025-21848", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21848" }, { "name": "CVE-2025-21855", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21855" }, { "name": "CVE-2025-21858", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21858" }, { "name": "CVE-2025-21865", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21865" }, { "name": "CVE-2025-21871", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21871" }, { "name": "CVE-2025-21877", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21877" }, { "name": "CVE-2025-21891", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21891" }, { "name": "CVE-2025-21916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916" }, { "name": "CVE-2025-21922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922" }, { "name": "CVE-2025-21934", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934" }, { "name": "CVE-2025-21935", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935" }, { "name": "CVE-2025-21993", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993" }, { "name": "CVE-2025-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996" }, { "name": "CVE-2025-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007" }, { "name": "CVE-2022-49046", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49046" }, { "name": "CVE-2022-49191", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49191" }, { "name": "CVE-2022-49220", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49220" }, { "name": "CVE-2022-49344", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49344" }, { "name": "CVE-2022-49372", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49372" }, { "name": "CVE-2022-49388", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49388" }, { "name": "CVE-2022-49395", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49395" }, { "name": "CVE-2022-49513", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49513" }, { "name": "CVE-2022-49578", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49578" }, { "name": "CVE-2022-49589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49589" }, { "name": "CVE-2022-49619", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49619" }, { "name": "CVE-2022-49620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49620" }, { "name": "CVE-2022-49727", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49727" }, { "name": "CVE-2022-49740", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49740" }, { "name": "CVE-2023-52997", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52997" }, { "name": "CVE-2023-53031", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53031" }, { "name": "CVE-2025-21969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969" } ], "initial_release_date": "2025-04-18T00:00:00", "last_revision_date": "2025-04-18T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0336", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-18T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1225-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251225-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1232-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251232-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1248-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251248-1" }, { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1276-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251276-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1259-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251259-1" }, { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1262-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251262-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1241-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251241-1" }, { "published_at": "2025-04-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1207-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251207-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1236-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251236-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1260-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251260-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1213-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251213-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1252-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251252-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1238-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251238-1" }, { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1275-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251275-1" }, { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1278-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251278-1" }, { "published_at": "2025-04-15", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1263-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251263-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1254-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251254-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1257-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251257-1" }, { "published_at": "2025-04-13", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1214-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251214-1" }, { "published_at": "2025-04-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1293-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251293-1" }, { "published_at": "2025-04-14", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1231-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251231-1" } ] }
CERTFR-2025-AVI-0449
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
SUSE | N/A | SUSE Manager Proxy 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
SUSE | N/A | SUSE Manager Proxy 4.3 | ||
SUSE | N/A | Basesystem Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
SUSE | N/A | openSUSE Leap 15.4 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
SUSE | N/A | openSUSE Leap 15.5 | ||
SUSE | N/A | SUSE Manager Server 4.3 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
SUSE | N/A | Legacy Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
SUSE | N/A | openSUSE Leap 15.6 | ||
SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
SUSE | N/A | SUSE Manager Server 4.2 | ||
SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
SUSE | N/A | openSUSE Leap 15.3 | ||
SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
SUSE | N/A | Development Tools Module 15-SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SUSE Linux Enterprise Micro for Rancher 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Desktop 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Proxy 4.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Basesystem Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro for Rancher 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Legacy Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 12-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Retail Branch Server 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Live Patching 15-SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Enterprise Storage 7.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP5 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Real Time 15 SP4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Manager Server 4.2", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Workstation Extension 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Performance Computing 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP3 LTSS", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.1", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.4", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "openSUSE Leap 15.3", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise High Availability Extension 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "Development Tools Module 15-SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Server 15 SP6", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } }, { "description": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "N/A", "vendor": { "name": "SUSE", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2023-0179", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0179" }, { "name": "CVE-2024-27018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27018" }, { "name": "CVE-2024-27415", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27415" }, { "name": "CVE-2022-48933", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48933" }, { "name": "CVE-2024-43882", "url": "https://www.cve.org/CVERecord?id=CVE-2024-43882" }, { "name": "CVE-2024-46763", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46763" }, { "name": "CVE-2024-46784", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46784" }, { "name": "CVE-2024-46865", "url": "https://www.cve.org/CVERecord?id=CVE-2024-46865" }, { "name": "CVE-2024-50272", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50272" }, { "name": "CVE-2024-53042", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53042" }, { "name": "CVE-2021-47163", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47163" }, { "name": "CVE-2024-42307", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42307" }, { "name": "CVE-2024-50038", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50038" }, { "name": "CVE-2024-50115", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50115" }, { "name": "CVE-2024-50083", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50083" }, { "name": "CVE-2024-50162", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50162" }, { "name": "CVE-2024-50163", "url": "https://www.cve.org/CVERecord?id=CVE-2024-50163" }, { "name": "CVE-2024-53156", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53156" }, { "name": "CVE-2024-56590", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56590" }, { "name": "CVE-2024-56641", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56641" }, { "name": "CVE-2024-56642", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56642" }, { "name": "CVE-2024-56661", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56661" }, { "name": "CVE-2024-49994", "url": "https://www.cve.org/CVERecord?id=CVE-2024-49994" }, { "name": "CVE-2024-53124", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53124" }, { "name": "CVE-2025-21683", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21683" }, { "name": "CVE-2024-53139", "url": "https://www.cve.org/CVERecord?id=CVE-2024-53139" }, { "name": "CVE-2024-56702", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56702" }, { "name": "CVE-2021-47659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47659" }, { "name": "CVE-2022-49044", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49044" }, { "name": "CVE-2022-49055", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49055" }, { "name": "CVE-2022-49060", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49060" }, { "name": "CVE-2022-49086", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49086" }, { "name": "CVE-2022-49111", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49111" }, { "name": "CVE-2022-49118", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49118" }, { "name": "CVE-2022-49121", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49121" }, { "name": "CVE-2022-49137", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49137" }, { "name": "CVE-2022-49175", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49175" }, { "name": "CVE-2022-49176", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49176" }, { "name": "CVE-2022-49179", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49179" }, { "name": "CVE-2022-49188", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49188" }, { "name": "CVE-2022-49232", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49232" }, { "name": "CVE-2022-49290", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49290" }, { "name": "CVE-2022-49305", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49305" }, { "name": "CVE-2022-49335", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49335" }, { "name": "CVE-2022-49351", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49351" }, { "name": "CVE-2022-49385", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49385" }, { "name": "CVE-2022-49411", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49411" }, { "name": "CVE-2022-49442", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49442" }, { "name": "CVE-2022-49478", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49478" }, { "name": "CVE-2022-49489", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49489" }, { "name": "CVE-2022-49504", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49504" }, { "name": "CVE-2022-49521", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49521" }, { "name": "CVE-2022-49525", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49525" }, { "name": "CVE-2022-49534", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49534" }, { "name": "CVE-2022-49535", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49535" }, { "name": "CVE-2022-49536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49536" }, { "name": "CVE-2022-49537", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49537" }, { "name": "CVE-2022-49542", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49542" }, { "name": "CVE-2022-49668", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49668" }, { "name": "CVE-2022-49693", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49693" }, { "name": "CVE-2022-49725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49725" }, { "name": "CVE-2022-49730", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49730" }, { "name": "CVE-2025-21772", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21772" }, { "name": "CVE-2025-21785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21785" }, { "name": "CVE-2024-54683", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54683" }, { "name": "CVE-2024-57924", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57924" }, { "name": "CVE-2025-21635", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21635" }, { "name": "CVE-2024-57980", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57980" }, { "name": "CVE-2024-57981", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57981" }, { "name": "CVE-2024-57998", "url": "https://www.cve.org/CVERecord?id=CVE-2024-57998" }, { "name": "CVE-2024-58001", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58001" }, { "name": "CVE-2024-58009", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58009" }, { "name": "CVE-2024-58017", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58017" }, { "name": "CVE-2024-58063", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58063" }, { "name": "CVE-2024-58068", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58068" }, { "name": "CVE-2024-58071", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58071" }, { "name": "CVE-2025-21707", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21707" }, { "name": "CVE-2025-21726", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21726" }, { "name": "CVE-2025-21735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21735" }, { "name": "CVE-2025-21750", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21750" }, { "name": "CVE-2025-21758", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21758" }, { "name": "CVE-2025-21764", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21764" }, { "name": "CVE-2025-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21779" }, { "name": "CVE-2025-21791", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21791" }, { "name": "CVE-2025-21792", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21792" }, { "name": "CVE-2025-21806", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21806" }, { "name": "CVE-2025-21812", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21812" }, { "name": "CVE-2022-49139", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49139" }, { "name": "CVE-2022-49205", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49205" }, { "name": "CVE-2022-49325", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49325" }, { "name": "CVE-2022-49390", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49390" }, { "name": "CVE-2022-49465", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49465" }, { "name": "CVE-2022-49658", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49658" }, { "name": "CVE-2022-49753", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49753" }, { "name": "CVE-2023-53023", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53023" }, { "name": "CVE-2023-53026", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53026" }, { "name": "CVE-2023-53033", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53033" }, { "name": "CVE-2024-52559", "url": "https://www.cve.org/CVERecord?id=CVE-2024-52559" }, { "name": "CVE-2024-58005", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58005" }, { "name": "CVE-2025-21839", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21839" }, { "name": "CVE-2025-21862", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21862" }, { "name": "CVE-2025-21886", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21886" }, { "name": "CVE-2025-21867", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21867" }, { "name": "CVE-2025-21875", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21875" }, { "name": "CVE-2025-21881", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21881" }, { "name": "CVE-2025-21887", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21887" }, { "name": "CVE-2025-21904", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21904" }, { "name": "CVE-2025-21905", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21905" }, { "name": "CVE-2025-21909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21909" }, { "name": "CVE-2025-21910", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21910" }, { "name": "CVE-2025-21912", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21912" }, { "name": "CVE-2025-21913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21913" }, { "name": "CVE-2025-21914", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21914" }, { "name": "CVE-2025-21916", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21916" }, { "name": "CVE-2025-21917", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21917" }, { "name": "CVE-2025-21918", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21918" }, { "name": "CVE-2025-21922", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21922" }, { "name": "CVE-2025-21924", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21924" }, { "name": "CVE-2025-21925", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21925" }, { "name": "CVE-2025-21926", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21926" }, { "name": "CVE-2025-21928", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21928" }, { "name": "CVE-2025-21934", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21934" }, { "name": "CVE-2025-21935", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21935" }, { "name": "CVE-2025-21936", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21936" }, { "name": "CVE-2025-21937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21937" }, { "name": "CVE-2025-21941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21941" }, { "name": "CVE-2025-21943", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21943" }, { "name": "CVE-2025-21948", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21948" }, { "name": "CVE-2025-21950", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21950" }, { "name": "CVE-2025-21951", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21951" }, { "name": "CVE-2025-21956", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21956" }, { "name": "CVE-2025-21957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21957" }, { "name": "CVE-2025-21960", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21960" }, { "name": "CVE-2025-21962", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21962" }, { "name": "CVE-2025-21963", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21963" }, { "name": "CVE-2025-21964", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21964" }, { "name": "CVE-2025-21968", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21968" }, { "name": "CVE-2025-21970", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21970" }, { "name": "CVE-2025-21971", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21971" }, { "name": "CVE-2025-21975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21975" }, { "name": "CVE-2025-21978", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21978" }, { "name": "CVE-2025-21979", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21979" }, { "name": "CVE-2025-21980", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21980" }, { "name": "CVE-2025-21981", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21981" }, { "name": "CVE-2025-21991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21991" }, { "name": "CVE-2025-21992", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21992" }, { "name": "CVE-2025-21993", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21993" }, { "name": "CVE-2025-21996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21996" }, { "name": "CVE-2025-21999", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21999" }, { "name": "CVE-2025-22004", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22004" }, { "name": "CVE-2025-22007", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22007" }, { "name": "CVE-2025-22008", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22008" }, { "name": "CVE-2025-22010", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22010" }, { "name": "CVE-2025-22014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22014" }, { "name": "CVE-2025-22015", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22015" }, { "name": "CVE-2023-53031", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53031" }, { "name": "CVE-2025-21969", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21969" }, { "name": "CVE-2025-21696", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21696" }, { "name": "CVE-2025-2312", "url": "https://www.cve.org/CVERecord?id=CVE-2025-2312" }, { "name": "CVE-2025-21927", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21927" }, { "name": "CVE-2023-53034", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53034" }, { "name": "CVE-2025-21853", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21853" }, { "name": "CVE-2025-22025", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22025" }, { "name": "CVE-2025-22027", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22027" }, { "name": "CVE-2025-22033", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22033" }, { "name": "CVE-2025-22044", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22044" }, { "name": "CVE-2025-22045", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22045" }, { "name": "CVE-2025-22050", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22050" }, { "name": "CVE-2025-22055", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22055" }, { "name": "CVE-2025-22058", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058" }, { "name": "CVE-2025-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22060" }, { "name": "CVE-2025-22075", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22075" }, { "name": "CVE-2025-22086", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22086" }, { "name": "CVE-2025-22088", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22088" }, { "name": "CVE-2025-22093", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22093" }, { "name": "CVE-2025-22097", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22097" }, { "name": "CVE-2025-23136", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23136" }, { "name": "CVE-2025-23138", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23138" }, { "name": "CVE-2025-37785", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37785" }, { "name": "CVE-2025-39728", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39728" }, { "name": "CVE-2025-39735", "url": "https://www.cve.org/CVERecord?id=CVE-2025-39735" }, { "name": "CVE-2024-28956", "url": "https://www.cve.org/CVERecord?id=CVE-2024-28956" }, { "name": "CVE-2025-21953", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21953" }, { "name": "CVE-2020-36789", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36789" }, { "name": "CVE-2021-47668", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47668" }, { "name": "CVE-2021-47669", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47669" }, { "name": "CVE-2021-47670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47670" }, { "name": "CVE-2021-47671", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47671" }, { "name": "CVE-2022-49110", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49110" }, { "name": "CVE-2022-49171", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49171" }, { "name": "CVE-2022-49197", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49197" }, { "name": "CVE-2022-49561", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49561" }, { "name": "CVE-2022-49590", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49590" }, { "name": "CVE-2022-49728", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49728" }, { "name": "CVE-2022-49741", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49741" }, { "name": "CVE-2022-49745", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49745" }, { "name": "CVE-2022-49749", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49749" }, { "name": "CVE-2022-49767", "url": "https://www.cve.org/CVERecord?id=CVE-2022-49767" }, { "name": "CVE-2023-52928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52928" }, { "name": "CVE-2023-52931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52931" }, { "name": "CVE-2023-52936", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52936" }, { "name": "CVE-2023-52937", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52937" }, { "name": "CVE-2023-52938", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52938" }, { "name": "CVE-2023-52981", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52981" }, { "name": "CVE-2023-52982", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52982" }, { "name": "CVE-2023-52986", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52986" }, { "name": "CVE-2023-52994", "url": "https://www.cve.org/CVERecord?id=CVE-2023-52994" }, { "name": "CVE-2023-53001", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53001" }, { "name": "CVE-2023-53002", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53002" }, { "name": "CVE-2023-53009", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53009" }, { "name": "CVE-2023-53014", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53014" }, { "name": "CVE-2023-53018", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53018" }, { "name": "CVE-2023-53032", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53032" }, { "name": "CVE-2023-53051", "url": "https://www.cve.org/CVERecord?id=CVE-2023-53051" }, { "name": "CVE-2024-35840", "url": "https://www.cve.org/CVERecord?id=CVE-2024-35840" }, { "name": "CVE-2024-58018", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58018" }, { "name": "CVE-2024-58070", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58070" }, { "name": "CVE-2024-58088", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58088" }, { "name": "CVE-2024-58093", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58093" }, { "name": "CVE-2024-58094", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58094" }, { "name": "CVE-2024-58095", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58095" }, { "name": "CVE-2024-58096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58096" }, { "name": "CVE-2024-58097", "url": "https://www.cve.org/CVERecord?id=CVE-2024-58097" }, { "name": "CVE-2025-21729", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21729" }, { "name": "CVE-2025-21755", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21755" }, { "name": "CVE-2025-21768", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21768" }, { "name": "CVE-2025-21808", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21808" }, { "name": "CVE-2025-21833", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21833" }, { "name": "CVE-2025-21836", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21836" }, { "name": "CVE-2025-21852", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21852" }, { "name": "CVE-2025-21854", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21854" }, { "name": "CVE-2025-21863", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21863" }, { "name": "CVE-2025-21873", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21873" }, { "name": "CVE-2025-21884", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884" }, { "name": "CVE-2025-21889", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21889" }, { "name": "CVE-2025-21894", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21894" }, { "name": "CVE-2025-21895", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21895" }, { "name": "CVE-2025-21906", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21906" }, { "name": "CVE-2025-21908", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21908" }, { "name": "CVE-2025-21915", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21915" }, { "name": "CVE-2025-21923", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21923" }, { "name": "CVE-2025-21930", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21930" }, { "name": "CVE-2025-21931", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931" }, { "name": "CVE-2025-21961", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21961" }, { "name": "CVE-2025-21966", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21966" }, { "name": "CVE-2025-21972", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21972" }, { "name": "CVE-2025-21976", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21976" }, { "name": "CVE-2025-21985", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21985" }, { "name": "CVE-2025-21995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-21995" }, { "name": "CVE-2025-22001", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22001" }, { "name": "CVE-2025-22003", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22003" }, { "name": "CVE-2025-22009", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22009" }, { "name": "CVE-2025-22013", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013" }, { "name": "CVE-2025-22016", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22016" }, { "name": "CVE-2025-22017", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22017" }, { "name": "CVE-2025-22018", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22018" }, { "name": "CVE-2025-22020", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22020" }, { "name": "CVE-2025-22029", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22029" }, { "name": "CVE-2025-22036", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22036" }, { "name": "CVE-2025-22053", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22053" }, { "name": "CVE-2025-22062", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22062" }, { "name": "CVE-2025-22064", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22064" }, { "name": "CVE-2025-22065", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22065" }, { "name": "CVE-2025-22080", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22080" }, { "name": "CVE-2025-22090", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22090" }, { "name": "CVE-2025-22102", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102" }, { "name": "CVE-2025-22104", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104" }, { "name": "CVE-2025-22105", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22105" }, { "name": "CVE-2025-22106", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22106" }, { "name": "CVE-2025-22107", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22107" }, { "name": "CVE-2025-22108", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22108" }, { "name": "CVE-2025-22109", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22109" }, { "name": "CVE-2025-22115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115" }, { "name": "CVE-2025-22116", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22116" }, { "name": "CVE-2025-22121", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22121" }, { "name": "CVE-2025-22128", "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128" }, { "name": "CVE-2025-23129", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23129" }, { "name": "CVE-2025-23131", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23131" }, { "name": "CVE-2025-23133", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23133" }, { "name": "CVE-2025-23145", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145" }, { "name": "CVE-2025-37798", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37798" }, { "name": "CVE-2025-37799", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799" }, { "name": "CVE-2025-37860", "url": "https://www.cve.org/CVERecord?id=CVE-2025-37860" } ], "initial_release_date": "2025-05-23T00:00:00", "last_revision_date": "2025-05-23T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0449", "revisions": [ { "description": "Version initiale", "revision_date": "2025-05-23T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE", "vendor_advisories": [ { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01627-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501627-1" }, { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01611-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501611-1" }, { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01614-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501614-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01656-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501656-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01652-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501652-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01668-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501668-1" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01601-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501601-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01682-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501682-1" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01590-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501590-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01676-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501676-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01655-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501655-1" }, { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01620-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501620-1" }, { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01633-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501633-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01672-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501672-1" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01593-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501593-1" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01600-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501600-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01675-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501675-1" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01603-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501603-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01669-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501669-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01677-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501677-1" }, { "published_at": "2025-05-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1574-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251574-1" }, { "published_at": "2025-05-20", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01598-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501598-1" }, { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01640-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501640-1" }, { "published_at": "2025-05-21", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01610-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501610-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01683-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501683-1" }, { "published_at": "2025-05-22", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:01663-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501663-1" }, { "published_at": "2025-05-16", "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2025:1573-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251573-1" } ] }
ghsa-w9jf-hmj5-fp54
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
macsec: fix UAF bug for real_dev
Create a new macsec device but not get reference to real_dev. That can not ensure that real_dev is freed after macsec. That will trigger the UAF bug for real_dev as following:
================================================================== BUG: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662 Call Trace: ... macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662 dev_get_iflink+0x73/0xe0 net/core/dev.c:637 default_operstate net/core/link_watch.c:42 [inline] rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54 linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161
Allocated by task 22209: ... alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549 rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235 veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748
Freed by task 8: ... kfree+0xd6/0x4d0 mm/slub.c:4552 kvfree+0x42/0x50 mm/util.c:615 device_release+0x9f/0x240 drivers/base/core.c:2229 kobject_cleanup lib/kobject.c:673 [inline] kobject_release lib/kobject.c:704 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1c8/0x540 lib/kobject.c:721 netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327
After commit faab39f63c1f ("net: allow out-of-order netdev unregistration") and commit e5f80fcf869a ("ipv6: give an IPv6 dev to blackhole_netdev"), we can add dev_hold_track() in macsec_dev_init() and dev_put_track() in macsec_free_netdev() to fix the problem.
{ "affected": [], "aliases": [ "CVE-2022-49390" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-02-26T07:01:15Z", "severity": "HIGH" }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacsec: fix UAF bug for real_dev\n\nCreate a new macsec device but not get reference to real_dev. That can\nnot ensure that real_dev is freed after macsec. That will trigger the\nUAF bug for real_dev as following:\n\n==================================================================\nBUG: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\nCall Trace:\n ...\n macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\n dev_get_iflink+0x73/0xe0 net/core/dev.c:637\n default_operstate net/core/link_watch.c:42 [inline]\n rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54\n linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161\n\nAllocated by task 22209:\n ...\n alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549\n rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235\n veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748\n\nFreed by task 8:\n ...\n kfree+0xd6/0x4d0 mm/slub.c:4552\n kvfree+0x42/0x50 mm/util.c:615\n device_release+0x9f/0x240 drivers/base/core.c:2229\n kobject_cleanup lib/kobject.c:673 [inline]\n kobject_release lib/kobject.c:704 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0x1c8/0x540 lib/kobject.c:721\n netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327\n\nAfter commit faab39f63c1f (\"net: allow out-of-order netdev unregistration\")\nand commit e5f80fcf869a (\"ipv6: give an IPv6 dev to blackhole_netdev\"), we\ncan add dev_hold_track() in macsec_dev_init() and dev_put_track() in\nmacsec_free_netdev() to fix the problem.", "id": "GHSA-w9jf-hmj5-fp54", "modified": "2025-02-27T18:31:08Z", "published": "2025-02-27T18:31:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49390" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
fkie_cve-2022-49390
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335 | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e | Patch | |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665 | Patch |
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "344FEFB4-E393-4E04-905A-4734AC267EC1", "versionEndExcluding": "4.15", "versionStartIncluding": "4.14.154", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B7EACEB9-7173-47F4-83A4-AE06CE74D78B", "versionEndExcluding": "4.20", "versionStartIncluding": "4.19.84", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADA13345-8170-4521-B0CB-44DDF2C0713F", "versionEndExcluding": "5.17.15", "versionStartIncluding": "5.3.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2", "versionEndExcluding": "5.18.3", "versionStartIncluding": "5.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacsec: fix UAF bug for real_dev\n\nCreate a new macsec device but not get reference to real_dev. That can\nnot ensure that real_dev is freed after macsec. That will trigger the\nUAF bug for real_dev as following:\n\n==================================================================\nBUG: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\nCall Trace:\n ...\n macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662\n dev_get_iflink+0x73/0xe0 net/core/dev.c:637\n default_operstate net/core/link_watch.c:42 [inline]\n rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54\n linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161\n\nAllocated by task 22209:\n ...\n alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549\n rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235\n veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748\n\nFreed by task 8:\n ...\n kfree+0xd6/0x4d0 mm/slub.c:4552\n kvfree+0x42/0x50 mm/util.c:615\n device_release+0x9f/0x240 drivers/base/core.c:2229\n kobject_cleanup lib/kobject.c:673 [inline]\n kobject_release lib/kobject.c:704 [inline]\n kref_put include/linux/kref.h:65 [inline]\n kobject_put+0x1c8/0x540 lib/kobject.c:721\n netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327\n\nAfter commit faab39f63c1f (\"net: allow out-of-order netdev unregistration\")\nand commit e5f80fcf869a (\"ipv6: give an IPv6 dev to blackhole_netdev\"), we\ncan add dev_hold_track() in macsec_dev_init() and dev_put_track() in\nmacsec_free_netdev() to fix the problem." }, { "lang": "es", "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: macsec: se corrige el error UAF para real_dev Crea un nuevo dispositivo macsec pero no obtiene la referencia a real_dev. Esto no puede garantizar que real_dev se libere despu\u00e9s de macsec. Esto activar\u00e1 el error UAF para real_dev de la siguiente manera: ==================================================================== ERROR: KASAN: use-after-free in macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662 Call Trace: ... macsec_get_iflink+0x5f/0x70 drivers/net/macsec.c:3662 dev_get_iflink+0x73/0xe0 net/core/dev.c:637 default_operstate net/core/link_watch.c:42 [inline] rfc2863_policy+0x233/0x2d0 net/core/link_watch.c:54 linkwatch_do_dev+0x2a/0x150 net/core/link_watch.c:161 Allocated by task 22209: ... alloc_netdev_mqs+0x98/0x1100 net/core/dev.c:10549 rtnl_create_link+0x9d7/0xc00 net/core/rtnetlink.c:3235 veth_newlink+0x20e/0xa90 drivers/net/veth.c:1748 Freed by task 8: ... kfree+0xd6/0x4d0 mm/slub.c:4552 kvfree+0x42/0x50 mm/util.c:615 device_release+0x9f/0x240 drivers/base/core.c:2229 kobject_cleanup lib/kobject.c:673 [inline] kobject_release lib/kobject.c:704 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1c8/0x540 lib/kobject.c:721 netdev_run_todo+0x72e/0x10b0 net/core/dev.c:10327 After commit faab39f63c1f (\"net: allow out-of-order netdev unregistration\") and commit e5f80fcf869a (\"ipv6: give an IPv6 dev to blackhole_netdev\"), we can add dev_hold_track() in macsec_dev_init() and dev_put_track() in macsec_free_netdev() to fix the problem. " } ], "id": "CVE-2022-49390", "lastModified": "2025-03-25T13:48:09.850", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-02-26T07:01:15.620", "references": [ { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/78933cbc143b82d02330e00900d2fd08f2682f4e" }, { "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "tags": [ "Patch" ], "url": "https://git.kernel.org/stable/c/d130282179aa6051449ac8f8df1115769998a665" } ], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
cnvd-2025-04679
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335
Name | Linux Kernel |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-49390", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-49390" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8emacsec\u8bbe\u5907\u672a\u83b7\u53d6real_dev\u7684\u5f15\u7528\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u91ca\u653e\u540e\u91cd\u7528\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/stable/c/196a888ca6571deb344468e1d7138e3273206335", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2025-04679", "openTime": "2025-03-10", "patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8emacsec\u8bbe\u5907\u672a\u83b7\u53d6real_dev\u7684\u5f15\u7528\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u91ca\u653e\u540e\u91cd\u7528\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux kernel macsec\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Linux Kernel" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2022-49390", "serverity": "\u4e2d", "submitTime": "2025-03-05", "title": "Linux kernel macsec\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.